Mock Version: 1.1.8 Mock Version: 1.1.8 ENTER do(['bash', '--login', '-c', 'rpmbuild -bs --target i686 --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/f16-build-1176367-186179/root/', None, 86400, True, 0, 419, 419, None, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bs --target i686 --nodeps builddir/build/SPECS/nss.spec'] warning: Could not canonicalize hostname: x86-04.phx2.fedoraproject.org Building target platforms: i686 Building for target i686 Wrote: /builddir/build/SRPMS/nss-3.13.1-2.fc16.src.rpm Child returncode was: 0 LEAVE do --> ENTER do(['bash', '--login', '-c', 'rpmbuild -bb --target i686 --nodeps builddir/build/SPECS/nss.spec'], False, '/var/lib/mock/f16-build-1176367-186179/root/', None, 86400, True, 0, 419, 419, None, logger=) Executing command: ['bash', '--login', '-c', 'rpmbuild -bb --target i686 --nodeps builddir/build/SPECS/nss.spec'] Building target platforms: i686 Building for target i686 Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.YczwWb + umask 022 + cd /builddir/build/BUILD + LANG=C + export LANG + unset DISPLAY + cd /builddir/build/BUILD + rm -rf nss-3.13.1 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-3.13.1-stripped.tar.bz2 + /bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.13.1 + /bin/chmod -Rf a+rX,u+w,g-w,o-w . + /bin/cp /builddir/build/SOURCES/PayPalEE.cert -f ./mozilla/security/nss/tests/libpkix/certs + cd /builddir/build/BUILD + cd nss-3.13.1 + /usr/bin/bzip2 -dc /builddir/build/SOURCES/nss-pem-20101125.tar.bz2 + /bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + /bin/chmod -Rf a+rX,u+w,g-w,o-w . + echo 'Patch #3 (renegotiate-transitional.patch):' Patch #3 (renegotiate-transitional.patch): + /bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -s -p0 -b --suffix .transitional --fuzz=0 + echo 'Patch #6 (nss-enable-pem.patch):' Patch #6 (nss-enable-pem.patch): + /bin/cat /builddir/build/SOURCES/nss-enable-pem.patch + /usr/bin/patch -s -p0 -b --suffix .libpem --fuzz=0 + echo 'Patch #7 (nsspem-642433.patch):' Patch #7 (nsspem-642433.patch): + /bin/cat /builddir/build/SOURCES/nsspem-642433.patch + /usr/bin/patch -s -p0 -b --suffix .642433 --fuzz=0 + echo 'Patch #8 (0001-Bug-695011-PEM-logging.patch):' Patch #8 (0001-Bug-695011-PEM-logging.patch): + /bin/cat /builddir/build/SOURCES/0001-Bug-695011-PEM-logging.patch + /usr/bin/patch -s -p1 -b --suffix .695011 --fuzz=0 + echo 'Patch #16 (nss-539183.patch):' Patch #16 (nss-539183.patch): + /bin/cat /builddir/build/SOURCES/nss-539183.patch + /usr/bin/patch -s -p0 -b --suffix .539183 --fuzz=0 + echo 'Patch #18 (nss-646045.patch):' Patch #18 (nss-646045.patch): + /bin/cat /builddir/build/SOURCES/nss-646045.patch + /usr/bin/patch -s -p0 -b --suffix .646045 --fuzz=0 + echo 'Patch #20 (nsspem-createobject-initialize-pointer.patch):' Patch #20 (nsspem-createobject-initialize-pointer.patch): + /bin/cat /builddir/build/SOURCES/nsspem-createobject-initialize-pointer.patch + /usr/bin/patch -s -p1 -b --suffix .717338 --fuzz=0 + echo 'Patch #21 (0001-libnsspem-rhbz-734760.patch):' Patch #21 (0001-libnsspem-rhbz-734760.patch): + /bin/cat /builddir/build/SOURCES/0001-libnsspem-rhbz-734760.patch + /usr/bin/patch -s -p1 -b --suffix .734760 --fuzz=0 + echo 'Patch #22 (nsspem-init-inform-not-thread-safe.patch):' Patch #22 (nsspem-init-inform-not-thread-safe.patch): + /bin/cat /builddir/build/SOURCES/nsspem-init-inform-not-thread-safe.patch + /usr/bin/patch -s -p0 -b --suffix .736410 --fuzz=0 + echo 'Patch #23 (nss-ckbi-1.88.rtm.patch):' Patch #23 (nss-ckbi-1.88.rtm.patch): + /bin/cat /builddir/build/SOURCES/nss-ckbi-1.88.rtm.patch + /usr/bin/patch -s -p0 -b --suffix .ckbi188 --fuzz=0 + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.8kQmrb + umask 022 + cd /builddir/build/BUILD + cd nss-3.13.1 + LANG=C + export LANG + unset DISPLAY + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' ++ /usr/bin/pkg-config --libs-only-L nspr ++ sed s/-L// + NSPR_LIB_DIR='/usr/lib ' + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-util ++ sed s/-I// + NSS_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' ++ /usr/bin/pkg-config --libs-only-L nss-util ++ sed s/-L// + NSS_LIB_DIR='/usr/lib ' + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + unset NSS_ENABLE_ECC + /usr/bin/make -C ./mozilla/security/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf/nsinstall' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nsinstall.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pathsub.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pathsub.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pathsub.o -lpthread -ldl -lc true -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf' + /usr/bin/make -C ./mozilla/security/dbm make: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/include' Creating ../../../dist/public/dbm ../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/src' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/db.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ../../../dbm/src/db.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_bigkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ../../../dbm/src/h_bigkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_func.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ../../../dbm/src/h_func.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_log2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ../../../dbm/src/h_log2.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_page.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ../../../dbm/src/h_page.c ../../../dbm/src/h_page.c: In function 'overflow_page': ../../../dbm/src/h_page.c:1002:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] ../../../dbm/src/h_page.c:1017:4: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] ../../../dbm/src/h_page.c:1043:5: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] ../../../dbm/src/h_page.c: In function 'new_lseek': ../../../dbm/src/h_page.c:165:15: warning: ignoring return value of 'write', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ../../../dbm/src/hash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash_buf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ../../../dbm/src/hash_buf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mktemp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ../../../dbm/src/mktemp.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dirent.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dirent.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a Linux2.6_x86_glibc_PTH_OPT.OBJ/db.o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_bigkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_func.o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_log2.o Linux2.6_x86_glibc_PTH_OPT.OBJ/h_page.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash_buf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/mktemp.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dirent.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a ../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a ../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm' + /usr/bin/make -C ./mozilla/security/nss make: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib' cd util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/util' Creating ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilrename.h ../../../../dist/public/nss Creating ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h hasht.h sechash.h nsslowhash.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken' cd legacydb; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../../dist/public/nss cd legacydb; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pk11pars.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h pk11init.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/base' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/dev' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pki' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certdb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certhigh' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pk11wrap' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/cryptohi' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/nss' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ssl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs12' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs7' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/smime' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/crmf' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/jar' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/lib' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secutil.h pk11table.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/bltest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/checkcert' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/digest' cd fipstest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/fipstest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/fipstest' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib' cd util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/util' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/quickder.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables quickder.c quickder.c: In function 'DecodeItem': quickder.c:643:12: warning: variable 'optional' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secdig.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secdig.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables derdec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derenc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables derenc.c derenc.c: In function 'der_encode': derenc.c:314:22: warning: variable 'optional' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dersubr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dersubr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dertime.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/errstrs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables errstrs.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nssb64d.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nssb64e.c nssb64e.c: In function 'NSSBase64_EncodeItem_Util': nssb64e.c:718:15: warning: 'out_len' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nssrwlk.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssilock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nssilock.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidstring.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables oidstring.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/portreg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables portreg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secalgid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secalgid.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secasn1d.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secasn1e.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secasn1u.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secitem.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secitem.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secload.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secload.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secoid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secoid.c secoid.c: In function 'SECOID_Init': secoid.c:1932:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sectime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sectime.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secport.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secport.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/templates.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables templates.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables utf8.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a Linux2.6_x86_glibc_PTH_OPT.OBJ/quickder.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secdig.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derenc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dersubr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/errstrs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssilock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidstring.o Linux2.6_x86_glibc_PTH_OPT.OBJ/portreg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secalgid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secitem.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secload.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secoid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sectime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secport.o Linux2.6_x86_glibc_PTH_OPT.OBJ/templates.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nssutil.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nssutil.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/quickder.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secdig.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derenc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dersubr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/errstrs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64d.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssb64e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssrwlk.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssilock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidstring.o Linux2.6_x86_glibc_PTH_OPT.OBJ/portreg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secalgid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1d.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secasn1u.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secitem.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secload.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secoid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sectime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secport.o Linux2.6_x86_glibc_PTH_OPT.OBJ/templates.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/loader.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables loader.c loader.c: In function 'freebl_LoadDSO': loader.c:166:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] loader.c: In function 'BL_Unload': loader.c:934:20: warning: unused variable 'status' [-Wunused-variable] rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a Linux2.6_x86_glibc_PTH_OPT.OBJ/loader.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib mkdir Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB /usr/bin/make FREEBL_CHILD_BUILD=1 \ OBJDIR=Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables freeblver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ldvector.c ldvector.c: In function 'FREEBL_GetVector': ldvector.c:301:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sysrand.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sha_fast.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables md2.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables md5.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sha512.c sha512.c: In function 'SHA512_Compress': sha512.c:925:14: warning: unused variable 't1' [-Wunused-variable] sha512.c:947:18: warning: unused variable 't2' [-Wunused-variable] sha512.c:947:14: warning: unused variable 't1' [-Wunused-variable] sha512.c: In function 'SHA512_End': sha512.c:1221:14: warning: unused variable 't1' [-Wunused-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables alghmac.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables rawhash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables alg2268.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables arcfour.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables arcfive.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables desblapi.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables des.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables drbg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables rijndael.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables aeskeywrap.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables camellia.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dh.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pqg.c pqg.c: In function 'PQG_ParamGenSeedLen': pqg.c:394:19: warning: variable 'b' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dsa.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables rsa.c rsa.c: In function 'get_blinding_params': rsa.c:1130:29: warning: variable 'prevbp' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables shvfy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables tlsprfalg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables seed.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables jpake.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables mpi/mpprime.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables mpi/mpmontg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables mpi/mplogic.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables mpi/mpi.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables mpi/mp_gf2m.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables mpi/mpcpucache.c mpi/mpcpucache.c: In function 's_mpi_is_sse2': mpi/mpcpucache.c:667:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] mpi/mpcpucache.c:655:9: warning: variable 'manufacturer' set but not used [-Wunused-but-set-variable] mpi/mpcpucache.c: In function 's_mpi_getProcessorLineSize': mpi/mpcpucache.c:714:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables stubs.c stubs.c: In function 'PR_Seek_stub': stubs.c:353:5: warning: enumeration value 'PR_SEEK_SET' not handled in switch [-Wswitch] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nsslowhash.c nsslowhash.c: In function 'NSSLOW_Init': nsslowhash.c:320:12: warning: variable 'nsprAvailable' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables -c mpi/mpi_x86.s grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecdecode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables fipsaudt.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables fipstest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables fipstokn.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgglue.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lgglue.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lowkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lowpbe.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/padbuf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables padbuf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkcs11.c pkcs11.c: In function 'NSC_GetInfo': pkcs11.c:3005:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkcs11c.c pkcs11c.c: In function 'NSC_GenerateKeyPair': pkcs11c.c:3777:11: warning: variable 'private_value_bits' set but not used [-Wunused-but-set-variable] pkcs11c.c: In function 'NSC_DeriveKey': pkcs11c.c:6265:9: warning: passing argument 3 of 'sftk_forceAttribute' discards 'const' qualifier from pointer target type [enabled by default] pkcs11i.h:638:14: note: expected 'void *' but argument is of type 'const CK_BYTE *' pkcs11c.c: In function 'NSC_GenerateKeyPair': pkcs11c.c:3549:13: warning: 'modulusLen' may be used uninitialized in this function [-Wuninitialized] pkcs11c.c:3495:14: note: 'modulusLen' was declared here pkcs11c.c: In function 'NSC_GenerateKey': pkcs11c.c:3422:13: warning: 'hashType' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkcs11u.c pkcs11u.c: In function 'sftk_DeleteObject': pkcs11u.c:1210:22: warning: unused variable 'to' [-Wunused-variable] pkcs11u.c: In function 'sftk_NewTokenObject': pkcs11u.c:1935:22: warning: variable 'tokObject' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables rsawrapr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sdb.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sftkdb.c sftkdb.c: In function 'sftkdb_fixupTemplateOut': sftkdb.c:361:22: warning: variable 'data' set but not used [-Wunused-but-set-variable] sftkdb.c: In function 'sftkdb_CreateObject': sftkdb.c:609:12: warning: variable 'inTransaction' set but not used [-Wunused-but-set-variable] sftkdb.c: In function 'sftkdb_handleIDAndName': sftkdb.c:2047:11: warning: variable 'crv' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkmod.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sftkmod.c sftkmod.c: In function 'sftkdb_AddSecmodDB': sftkmod.c:744:8: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] sftkmod.c: In function 'sftkdb_DeleteSecmodDB': sftkmod.c:637:12: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] sftkmod.c:619:5: warning: 'lib_len' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sftkpars.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sftkpwd.c sftkpwd.c: In function 'sftk_updateMacs': sftkpwd.c:902:11: warning: variable 'crv2' set but not used [-Wunused-but-set-variable] sftkpwd.c:901:11: warning: variable 'crv' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/softkver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables softkver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables tlsprf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables jpakesftk.c jpakesftk.c: In function 'jpake_Sign': jpakesftk.c:78:13: warning: suggest parentheses around '&&' within '||' [-Wparentheses] jpakesftk.c:79:13: warning: suggest parentheses around '&&' within '||' [-Wparentheses] jpakesftk.c: At top level: jpakesftk.c:113:1: warning: 'jpake_ensureKeyType' defined but not used [-Wunused-function] rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a Linux2.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgglue.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o Linux2.6_x86_glibc_PTH_OPT.OBJ/padbuf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkmod.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o Linux2.6_x86_glibc_PTH_OPT.OBJ/softkver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/softokn.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/softokn.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/ecdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipsaudt.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstokn.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgglue.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowpbe.o Linux2.6_x86_glibc_PTH_OPT.OBJ/padbuf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11c.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkcs11u.o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkmod.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpars.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sftkpwd.o Linux2.6_x86_glibc_PTH_OPT.OBJ/softkver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/tlsprf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jpakesftk.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib cd legacydb; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dbmshim.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/keydb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables keydb.c keydb.c: In function 'encodePWCheckEntry': keydb.c:1998:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] keydb.c: In function 'nsslowkey_ResetKeyDB': keydb.c:2040:9: warning: variable 'ret' set but not used [-Wunused-but-set-variable] keydb.c: In function 'keydb_Get': keydb.c:2097:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] keydb.c: In function 'keydb_Put': keydb.c:2115:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] keydb.c: In function 'keydb_Sync': keydb.c:2133:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] keydb.c: In function 'keydb_Del': keydb.c:2151:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] keydb.c: In function 'keydb_Seq': keydb.c:2169:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] keydb.c: In function 'keydb_Close': keydb.c:2187:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgattr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lgattr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lgcreate.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lgdestroy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lgfind.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lginit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lginit.c lginit.c: In function 'legacy_Open': lginit.c:629:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lgutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lowcert.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lowkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pcertdb.c pcertdb.c: In function 'nsslowcert_UnlockDB': pcertdb.c:140:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'nsslowcert_UnlockCertRefCount': pcertdb.c:171:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'nsslowcert_UnlockCertTrust': pcertdb.c:203:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'nsslowcert_UnlockFreeList': pcertdb.c:236:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'certdb_Get': pcertdb.c:261:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'certdb_Put': pcertdb.c:277:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'certdb_Sync': pcertdb.c:293:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'certdb_Del': pcertdb.c:310:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'certdb_Seq': pcertdb.c:331:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'certdb_Close': pcertdb.c:347:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'NewDBSubjectEntry': pcertdb.c:2467:18: warning: variable 'eaddrlen' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'UpdateV6DB': pcertdb.c:3623:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'UpdateV5DB': pcertdb.c:3828:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] pcertdb.c: In function 'nsslowcert_FindCrlByKey': pcertdb.c:5107:9: warning: variable 'key' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11db.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11db.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a Linux2.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o Linux2.6_x86_glibc_PTH_OPT.OBJ/keydb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgattr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgfind.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lginit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11db.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nssdbm.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nssdbm.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/dbmshim.o Linux2.6_x86_glibc_PTH_OPT.OBJ/keydb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgattr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgcreate.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgdestroy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgfind.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lginit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lgutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lowkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pcertdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11db.o ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a -L../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/base' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/arena.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables arena.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables error.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/errorval.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables errorval.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hashops.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables hashops.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables libc.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tracker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables tracker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/item.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables item.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables utf8.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables list.c list.c: In function 'nssList_Add': list.c:256:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables hash.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a Linux2.6_x86_glibc_PTH_OPT.OBJ/arena.o Linux2.6_x86_glibc_PTH_OPT.OBJ/error.o Linux2.6_x86_glibc_PTH_OPT.OBJ/errorval.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hashops.o Linux2.6_x86_glibc_PTH_OPT.OBJ/libc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/tracker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/item.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/dev' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/devslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables devslot.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/devtoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables devtoken.c devtoken.c: In function 'nssToken_TraverseCertificates': devtoken.c:1505:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/devutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables devutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ckhelper.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a Linux2.6_x86_glibc_PTH_OPT.OBJ/devslot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/devtoken.o Linux2.6_x86_glibc_PTH_OPT.OBJ/devutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pki' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables asymmkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certificate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certificate.c certificate.c: In function 'nssCertificateList_DoCallback': certificate.c:933:14: warning: variable 'nssrv' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cryptocontext.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/symmkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables symmkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables trustdomain.c trustdomain.c: In function 'NSSTrustDomain_TraverseCertificates': trustdomain.c:1034:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tdcache.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables tdcache.c tdcache.c: In function 'merge_object_instances': tdcache.c:736:49: warning: comparison between 'PRStatus' and 'enum _SECStatus' [-Wenum-compare] tdcache.c: In function 'add_cert_to_cache': tdcache.c:807:9: warning: variable 'handle' set but not used [-Wunused-but-set-variable] tdcache.c: In function 'nssTrustDomain_RemoveCertFromCacheLOCKED': tdcache.c:308:16: warning: 'nickname' may be used uninitialized in this function [-Wuninitialized] tdcache.c:368:14: note: 'nickname' was declared here gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certdecode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkistore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkistore.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkibase.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkibase.c pkibase.c: In function 'nssPKIObjectCollection_Traverse': pkibase.c:920:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] pkibase.c: In function 'nssCertificateCollection_Create': pkibase.c:1074:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] pkibase.c: In function 'nssCRLCollection_Create': pkibase.c:1181:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pki3hack.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a Linux2.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certificate.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/symmkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o Linux2.6_x86_glibc_PTH_OPT.OBJ/tdcache.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkistore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkibase.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_certselector.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_comcertselparams.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_crlselector.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_comcrlselparams.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_basicconstraintschecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_certchainchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_crlchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_ekuchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_expirationchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_namechainingchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_nameconstraintschecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_ocspchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_revocationmethod.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_revocationchecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_policychecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_signaturechecker.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_targetcertchecker.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_trustanchor.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_procparams.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_valparams.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_resourcelimits.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_buildresult.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_policynode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_valresult.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_verifynode.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_store.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_validate.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_lifecycle.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_build.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_tools.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_error.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_logger.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_list.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_errpaths.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_basicconstraints.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_cert.c pkix_pl_cert.c: In function 'PKIX_PL_Cert_Create': pkix_pl_cert.c:1551:22: warning: variable 'copyDER' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_certpolicyinfo.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_certpolicymap.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_certpolicyqualifier.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_crl.c pkix_pl_crl.c: In function 'pkix_pl_CRL_ToString': pkix_pl_crl.c:488:9: warning: 'crlVersion' may be used uninitialized in this function [-Wuninitialized] pkix_pl_crl.c:387:21: note: 'crlVersion' was declared here gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_crldp.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_crlentry.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_date.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_generalname.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_infoaccess.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_nameconstraints.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_ocsprequest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_ocspresponse.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_publickey.c pkix_pl_publickey.c: In function 'pkix_pl_PublicKey_Hashcode': pkix_pl_publickey.c:247:21: warning: variable 'fullHash' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_x500name.c pkix_pl_x500name.c:70:1: warning: 'pkix_pl_X500Name_ToString_Helper' defined but not used [-Wunused-function] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_ocspcertid.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_bigint.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_bytearray.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_common.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_error.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_hashtable.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_lifecycle.c pkix_pl_lifecycle.c: In function 'PKIX_PL_Shutdown': pkix_pl_lifecycle.c:279:21: warning: variable 'numLeakedObjects' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_mem.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_monitorlock.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_mutex.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_object.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_oid.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_primhash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_rwlock.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_string.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_aiamgr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_colcertstore.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_httpcertstore.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_httpdefaultclient.c pkix_pl_httpdefaultclient.c: In function 'pkix_pl_HttpDefaultClient_KeepAliveSession': pkix_pl_httpdefaultclient.c:1168:36: warning: variable 'client' set but not used [-Wunused-but-set-variable] pkix_pl_httpdefaultclient.c: In function 'pkix_pl_HttpDefaultClient_Cancel': pkix_pl_httpdefaultclient.c:1520:36: warning: variable 'client' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_ldaptemplates.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_ldapcertstore.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_ldapresponse.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_ldaprequest.c pkix_pl_ldaprequest.c: In function 'pkix_pl_LdapRequest_Destroy': pkix_pl_ldaprequest.c:299:30: warning: variable 'ldapRq' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_ldapdefaultclient.c pkix_pl_ldapdefaultclient.c: In function 'pkix_pl_LdapDefaultClient_VerifyBindResponse': pkix_pl_ldapdefaultclient.c:404:21: warning: 'msg.protocolOp.op.bindResponseMsg.resultCode.data' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_nsscontext.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_pk11certstore.c pkix_pl_pk11certstore.c: In function 'NameCacheHasFetchedCrlInfo': pkix_pl_pk11certstore.c:419:22: warning: variable 'cert' set but not used [-Wunused-but-set-variable] pkix_pl_pk11certstore.c: In function 'DownloadCrl': pkix_pl_pk11certstore.c:819:16: warning: variable 'savedError' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pkix_pl_socket.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certdb' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/alg1485.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables alg1485.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certdb.c certdb.c: In function 'cert_VerifySubjectAltName': certdb.c:1457:23: warning: variable 'hnLen' set but not used [-Wunused-but-set-variable] certdb.c: In function 'CERT_ImportCerts': certdb.c:2466:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] certdb.c: In function 'CERT_UnlockCertRefCount': certdb.c:2912:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] certdb.c: In function 'CERT_UnlockCertTrust': certdb.c:2991:14: warning: variable 'prstat' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certv3.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certv3.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certxutl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certxutl.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crl.c crl.c: In function 'crl_storeCRL': crl.c:664:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] crl.c: In function 'cert_CheckCertRevocationStatus': crl.c:2666:25: warning: comparison between 'enum _SECStatus' and 'SECCertTimeValidity' [-Wenum-compare] crl.c:2722:27: warning: unused variable 'rv2' [-Wunused-variable] crl.c: In function 'cert_CacheCRLByGeneralName': crl.c:3079:32: warning: variable 'rv2' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/genname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables genname.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables stanpcertdb.c stanpcertdb.c: In function 'CERT_FindCertByNicknameOrEmailAddr': stanpcertdb.c:711:55: warning: passing argument 2 of 'common_FindCertByNicknameOrEmailAddrForUsage' discards 'const' qualifier from pointer target type [enabled by default] stanpcertdb.c:633:1: note: expected 'char *' but argument is of type 'const char *' stanpcertdb.c: In function 'CERT_FindCertByNicknameOrEmailAddrForUsage': stanpcertdb.c:721:55: warning: passing argument 2 of 'common_FindCertByNicknameOrEmailAddrForUsage' discards 'const' qualifier from pointer target type [enabled by default] stanpcertdb.c:633:1: note: expected 'char *' but argument is of type 'const char *' stanpcertdb.c: In function 'common_FindCertByNicknameOrEmailAddrForUsage': stanpcertdb.c:696:27: warning: 'cert' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables polcyxtn.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secname.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secname.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables xauthkid.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables xbsconst.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/xconst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables xconst.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a Linux2.6_x86_glibc_PTH_OPT.OBJ/alg1485.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certv3.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certxutl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/genname.o Linux2.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux2.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secname.o Linux2.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o Linux2.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o Linux2.6_x86_glibc_PTH_OPT.OBJ/xconst.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certhigh' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certhtml.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certhtml.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certreq.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certreq.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlv2.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crlv2.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ocsp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ocsp.c ocsp.c: In function 'ocsp_RemoveCacheItem': ocsp.c:597:12: warning: variable 'couldRemoveFromHashTable' set but not used [-Wunused-but-set-variable] ocsp.c: In function 'CERT_EncodeOCSPRequest': ocsp.c:1470:21: warning: variable 'tbsRequest' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certhigh.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certhigh.c certhigh.c: In function 'CERT_MatchNickname': certhigh.c:60:9: warning: variable 'len' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certvfy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certvfypkix.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certvfypkixprint.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables xcrldist.c xcrldist.c: In function 'CERT_EncodeCRLDistributionPoints': xcrldist.c:137:6: warning: case value '0' not in enumerated type 'DistributionPointTypes' [-Wswitch] rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a Linux2.6_x86_glibc_PTH_OPT.OBJ/certhtml.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certreq.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlv2.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ocsp.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certhigh.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o Linux2.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pk11wrap' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dev3hack.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11akey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11auth.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11cert.c pk11cert.c: In function 'PK11_IsUserCert': pk11cert.c:177:2: warning: enumeration value 'rsaPssKey' not handled in switch [-Wswitch] pk11cert.c:177:2: warning: enumeration value 'rsaOaepKey' not handled in switch [-Wswitch] pk11cert.c: In function 'pk11_fastCert': pk11cert.c:264:14: warning: variable 'status' set but not used [-Wunused-but-set-variable] pk11cert.c: In function 'PK11_MakeCertFromHandle': pk11cert.c:330:12: warning: variable 'swapNickname' set but not used [-Wunused-but-set-variable] pk11cert.c:329:12: warning: variable 'isFortezzaRootCA' set but not used [-Wunused-but-set-variable] pk11cert.c: In function 'PK11_TraverseCertsForNicknameInSlot': pk11cert.c:2026:28: warning: variable 'pk11cb' set but not used [-Wunused-but-set-variable] pk11cert.c: In function 'PK11_FindCertFromDERCertItem': pk11cert.c:2170:21: warning: unused variable 'td' [-Wunused-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11cxt.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11err.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11err.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11kea.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11list.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11load.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11load.c pk11load.c: In function 'SECMOD_UnloadModule': pk11load.c:600:28: warning: unused variable 'status' [-Wunused-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11mech.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11merge.c pk11merge.c: In function 'pk11_mergeByObjectIDs': pk11merge.c:846:15: warning: 'error' may be used uninitialized in this function [-Wuninitialized] pk11merge.c:747:9: note: 'error' was declared here gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11nobj.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11obj.c pk11obj.c: In function 'PK11_MatchItem': pk11obj.c:1593:22: warning: variable 'parent' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11pars.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11pbe.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11pk12.c pk11pk12.c: In function 'PK11_ImportPrivateKeyInfoAndReturnKey': pk11pk12.c:456:17: warning: variable 'keyType' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11pqg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11sdr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11skey.c pk11skey.c: In function 'pk11_TokenKeyGenWithFlagsAndKeyType': pk11skey.c:923:12: warning: unused variable 'isToken' [-Wunused-variable] pk11skey.c:919:11: warning: unused variable 'crv' [-Wunused-variable] pk11skey.c:917:23: warning: unused variable 'session' [-Wunused-variable] pk11skey.c: In function 'PK11_PubDerive': pk11skey.c:1601:5: warning: enumeration value 'rsaPssKey' not handled in switch [-Wswitch] pk11skey.c:1601:5: warning: enumeration value 'rsaOaepKey' not handled in switch [-Wswitch] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11slot.c pk11slot.c: In function 'PK11_InitToken': pk11slot.c:1113:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable] pk11slot.c: In function 'PK11_InitSlot': pk11slot.c:1357:11: warning: variable 'tmp' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11util.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux2.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11err.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11list.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11load.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11util.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/cryptohi' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sechash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sechash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/seckey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables seckey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secsign.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secvfy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secvfy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dsautil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dsautil.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a Linux2.6_x86_glibc_PTH_OPT.OBJ/sechash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/seckey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secsign.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secvfy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/dsautil.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/nss' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nssinit.c nssinit.c: In function 'NSS_VersionCheck': nssinit.c:1254:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nssver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables utilwrap.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a Linux2.6_x86_glibc_PTH_OPT.OBJ/nssinit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nss.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nss.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/nssinit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nssver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/certvfypkixprint.o ../certhigh/Linux2.6_x86_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux2.6_x86_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux2.6_x86_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux2.6_x86_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux2.6_x86_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux2.6_x86_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux2.6_x86_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/arena.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/error.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/libc.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/item.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o ../base/Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux2.6_x86_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ssl' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derive.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables derive.c derive.c: In function 'SSL_CanBypass': derive.c:606:18: warning: variable 'testecdhe' set but not used [-Wunused-but-set-variable] derive.c:605:18: warning: variable 'testecdh' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/prelib.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables prelib.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ssl3con.c ssl3con.c: In function 'ssl3_InitPendingContextsBypass': ssl3con.c:1447:28: warning: variable 'compression_method' set but not used [-Wunused-but-set-variable] ssl3con.c:1445:26: warning: variable 'macLength' set but not used [-Wunused-but-set-variable] ssl3con.c: In function 'ssl3_IllegalParameter': ssl3con.c:2591:12: warning: variable 'isTLS' set but not used [-Wunused-but-set-variable] ssl3con.c: In function 'ssl3_HandleCertificate': ssl3con.c:7819:22: warning: variable 'trusted' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ssl3gthr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslauth.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslauth.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslcon.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslcon.c sslcon.c: In function 'ssl2_HandleMessage': sslcon.c:2531:22: warning: variable 'rv2' set but not used [-Wunused-but-set-variable] sslcon.c: In function 'NSSSSL_VersionCheck': sslcon.c:3850:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssldef.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ssldef.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslenum.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslenum.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslerr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslerrstrs.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslinit.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ssl3ext.c ssl3ext.c: In function 'ssl3_GetSessionTicketKeys': ssl3ext.c:211:38: warning: comparison between 'PRStatus' and 'enum _SECStatus' [-Wenum-compare] ssl3ext.c: In function 'ssl3_HandleServerNameXtn': ssl3ext.c:399:18: warning: variable 'type' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslgathr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslmutex.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslnonce.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslreveal.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslsecur.c sslsecur.c: In function 'ssl_SecureRecv': sslsecur.c:1122:22: warning: variable 'sec' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslsnce.c sslsnce.c: In function 'InitCache': sslsnce.c:1257:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1258:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1259:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1260:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1261:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1262:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1263:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1264:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1265:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1266:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1267:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1268:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1269:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c: In function 'SSL_InheritMPServerSIDCacheInstance': sslsnce.c:1609:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1610:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1611:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1612:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1613:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1614:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1615:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1616:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1617:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1618:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1619:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1620:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] sslsnce.c:1621:5: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsock.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslsock.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ssltrace.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/authcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables authcert.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmpcert.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsskea.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nsskea.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sslinfo.c sslinfo.c: In function 'SSL_DisableDefaultExportCipherSuites': sslinfo.c:272:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] sslinfo.c: In function 'SSL_DisableExportCipherSuites': sslinfo.c:293:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ssl3ecc.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/unix_err.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables unix_err.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a Linux2.6_x86_glibc_PTH_OPT.OBJ/derive.o Linux2.6_x86_glibc_PTH_OPT.OBJ/prelib.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslauth.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslcon.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssldef.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslenum.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/authcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsskea.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/unix_err.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/derive.o Linux2.6_x86_glibc_PTH_OPT.OBJ/prelib.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3con.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslauth.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslcon.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssldef.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslenum.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinit.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslgathr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslmutex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslnonce.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslreveal.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsecur.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsnce.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslsock.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltrace.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/authcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmpcert.o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsskea.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sslinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/unix_err.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs12' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12local.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p12local.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12creat.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p12creat.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12dec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p12dec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p12plcy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p12tmpl.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12e.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p12e.c p12e.c: In function 'sec_PKCS12CreateSafeBag': p12e.c:728:12: warning: variable 'setName' set but not used [-Wunused-but-set-variable] p12e.c: In function 'sec_pkcs12_encoder_start_context': p12e.c:1564:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12d.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p12d.c p12d.c: In function 'SEC_PKCS12DecoderImportBags': p12d.c:2498:9: warning: 'keyUsage' may be used uninitialized in this function [-Wuninitialized] p12d.c:2921:19: note: 'keyUsage' was declared here rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a Linux2.6_x86_glibc_PTH_OPT.OBJ/p12local.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12creat.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12dec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12e.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p12d.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs7' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certread.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certread.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7common.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p7common.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7create.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p7create.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7decode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p7decode.c p7decode.c: In function 'sec_pkcs7_decoder_get_recipient_key': p7decode.c:443:9: warning: unused variable 'bulkLength' [-Wunused-variable] p7decode.c: In function 'sec_pkcs7_verify_signature': p7decode.c:1324:21: warning: variable 'crls' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7encode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p7encode.c p7encode.c: In function 'sec_pkcs7_encoder_start_encrypt': p7encode.c:97:18: warning: variable 'wincx' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7local.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p7local.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secmime.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secmime.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a Linux2.6_x86_glibc_PTH_OPT.OBJ/certread.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7common.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7create.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7decode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7encode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7local.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secmime.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/smime' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsarray.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsasn1.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsattr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmscinfo.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmscipher.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsdecode.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsdigdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsdigest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsencdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsencode.c cmsencode.c: In function 'nss_cms_encoder_notify': cmsencode.c:159:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable] cmsencode.c: In function 'nss_cms_before_data': cmsencode.c:238:18: warning: variable 'poolp' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsenvdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsmessage.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmspubkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsrecinfo.c cmsrecinfo.c: In function 'NSS_CMSRecipientInfo_UnwrapBulkKey': cmsrecinfo.c:563:21: warning: variable 'encalg' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsreclist.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmssigdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmssiginfo.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsudf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables smimemessage.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables smimeutil.c smimeutil.c: In function 'NSSSMIME_VersionCheck': smimeutil.c:768:19: warning: variable 'c' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimever.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables smimever.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimever.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/smime.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/smime.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsarray.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsasn1.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsattr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmscipher.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdecode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsdigest.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsencode.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsmessage.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmspubkey.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsreclist.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssigdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsudf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimemessage.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimeutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux2.6_x86_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux2.6_x86_glibc_PTH_OPT.OBJ/secmime.o -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/crmf' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfenc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crmfenc.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftmpl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crmftmpl.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfreq.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crmfreq.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfpop.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crmfpop.c crmfpop.c: In function 'CRMF_CertReqMsgSetRAVerifiedPOP': crmfpop.c:68:28: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfdec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crmfdec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfget.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crmfget.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfcont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crmfcont.c crmfcont.c: In function 'CRMF_CreateEncryptedKeyWithEncryptedValue': crmfcont.c:892:31: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmmfasn1.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfresp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmmfresp.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfrec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmmfrec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfchal.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmmfchal.c cmmfchal.c: In function 'cmmf_create_witness_and_challenge': cmmfchal.c:65:22: warning: variable 'id' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/servget.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables servget.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/encutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables encutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/respcli.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables respcli.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/respcmn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables respcmn.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/challcli.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables challcli.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/asn1cmn.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables asn1cmn.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfenc.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftmpl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfreq.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfpop.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfdec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfget.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmfcont.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfresp.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfrec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmmfchal.o Linux2.6_x86_glibc_PTH_OPT.OBJ/servget.o Linux2.6_x86_glibc_PTH_OPT.OBJ/encutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/respcli.o Linux2.6_x86_glibc_PTH_OPT.OBJ/respcmn.o Linux2.6_x86_glibc_PTH_OPT.OBJ/challcli.o Linux2.6_x86_glibc_PTH_OPT.OBJ/asn1cmn.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/jar' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables jarver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables jarsign.c jarsign.c: In function 'jar_create_pk7': jarsign.c:206:11: warning: variable 'errstring' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jar.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables jar.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jar-ds.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables jar-ds.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarfile.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables jarfile.c jarfile.c: In function 'jar_listzip': jarfile.c:722:2: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c:726:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c:727:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c:749:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c:754:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c:755:6: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c:793:3: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c:816:11: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c:817:4: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c:818:4: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] jarfile.c: In function 'jar_listtar': jarfile.c:856:12: warning: variable 'when' set but not used [-Wunused-but-set-variable] jarfile.c:855:14: warning: variable 'mode' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X86 -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables jarint.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a Linux2.6_x86_glibc_PTH_OPT.OBJ/jarver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarsign.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jar.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jar-ds.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarfile.o Linux2.6_x86_glibc_PTH_OPT.OBJ/jarint.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crypto.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crypto.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/find.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables find.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables hash.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/instance.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables instance.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mutex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables mutex.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/object.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables object.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/session.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables session.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sessobj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sessobj.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/slot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables slot.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/token.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables token.c token.c: In function 'nssCKFWToken_GetUTCTime': token.c:1297:27: warning: variable 'z' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/wrap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables wrap.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mechanism.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables mechanism.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a Linux2.6_x86_glibc_PTH_OPT.OBJ/crypto.o Linux2.6_x86_glibc_PTH_OPT.OBJ/find.o Linux2.6_x86_glibc_PTH_OPT.OBJ/hash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/instance.o Linux2.6_x86_glibc_PTH_OPT.OBJ/mutex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/object.o Linux2.6_x86_glibc_PTH_OPT.OBJ/session.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sessobj.o Linux2.6_x86_glibc_PTH_OPT.OBJ/slot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/token.o Linux2.6_x86_glibc_PTH_OPT.OBJ/wrap.o Linux2.6_x86_glibc_PTH_OPT.OBJ/mechanism.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables anchor.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/constants.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables constants.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables bfind.c bfind.c: In function 'nss_builtins_FindObjectsInit': bfind.c:158:19: warning: 'data' may be used uninitialized in this function [-Wuninitialized] bfind.c:154:17: note: 'data' was declared here gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/binst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables binst.c binst.c: In function 'builtins_mdInstance_GetLibraryVersion': binst.c:106:17: warning: variable 'c' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bobject.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables bobject.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bsession.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables bsession.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables bslot.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/btoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables btoken.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdata.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certdata.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckbiver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so Linux2.6_x86_glibc_PTH_OPT.OBJ/anchor.o Linux2.6_x86_glibc_PTH_OPT.OBJ/constants.o Linux2.6_x86_glibc_PTH_OPT.OBJ/bfind.o Linux2.6_x86_glibc_PTH_OPT.OBJ/binst.o Linux2.6_x86_glibc_PTH_OPT.OBJ/bobject.o Linux2.6_x86_glibc_PTH_OPT.OBJ/bsession.o Linux2.6_x86_glibc_PTH_OPT.OBJ/bslot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/btoken.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certdata.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/anchor.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables anchor.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/constants.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables constants.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pargs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pargs.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pfind.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pfind.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pinst.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pinst.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pobject.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pobject.c pobject.c: In function 'pem_DestroyInternalObject': pobject.c:588:5: warning: enumeration value 'pemAll' not handled in switch [-Wswitch] pobject.c: In function 'pem_CreateObject': pobject.c:1046:15: warning: variable 'token' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/prsa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables prsa.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/psession.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables psession.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pslot.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pslot.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ptoken.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ptoken.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckpemver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ckpemver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables rsawrapr.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables util.c util.c: In function 'ReadDERFromFile': util.c:142:9: warning: variable 'error' set but not used [-Wunused-but-set-variable] grep -v ';-' nsspem.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux2.6_x86_glibc_PTH_OPT.OBJ/nsspem.def rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnsspem.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/nsspem.def -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so Linux2.6_x86_glibc_PTH_OPT.OBJ/anchor.o Linux2.6_x86_glibc_PTH_OPT.OBJ/constants.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pargs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pfind.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pinst.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pobject.o Linux2.6_x86_glibc_PTH_OPT.OBJ/prsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/psession.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pslot.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ptoken.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ckpemver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsawrapr.o Linux2.6_x86_glibc_PTH_OPT.OBJ/util.o ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/sysinit' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nsssysinit.c ../../../../dist/private/nss/pk11pars.h:246:1: warning: 'secmod_argParseModuleSpec' defined but not used [-Wunused-function] ../../../../dist/private/nss/pk11pars.h:327:1: warning: 'secmod_argSetNewCipherFlags' defined but not used [-Wunused-function] ../../../../dist/private/nss/pk11pars.h:499:1: warning: 'secmod_argParseSlotInfo' defined but not used [-Wunused-function] ../../../../dist/private/nss/pk11pars.h:756:1: warning: 'secmod_mkSlotString' defined but not used [-Wunused-function] ../../../../dist/private/nss/pk11pars.h:793:1: warning: 'secmod_mkNSS' defined but not used [-Wunused-function] ../../../../dist/private/nss/pk11pars.h:854:1: warning: 'secmod_mkNewModuleSpec' defined but not used [-Wunused-function] rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux2.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libnsssysinit.so -o Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux2.6_x86_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/lib' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secutil.c secutil.c: In function 'SECU_ChangePW2': secutil.c:408:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/secpwd.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables secpwd.c secpwd.c: In function 'SEC_GetPassword': secpwd.c:109:14: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derprint.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables derprint.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/moreoids.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables moreoids.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pppolicy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pppolicy.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ffs.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ffs.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11table.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11table.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a Linux2.6_x86_glibc_PTH_OPT.OBJ/secutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/secpwd.o Linux2.6_x86_glibc_PTH_OPT.OBJ/derprint.o Linux2.6_x86_glibc_PTH_OPT.OBJ/moreoids.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pppolicy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/ffs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11table.o ranlib Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/addbuiltin' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables addbuiltin.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/atob' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/atob.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables atob.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/atob -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/atob.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/atob ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/bltest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/blapitest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables blapitest.c blapitest.c: In function 'serialize_key': blapitest.c:352:15: warning: variable 'status' set but not used [-Wunused-but-set-variable] blapitest.c: In function 'setupIO': blapitest.c:904:16: warning: pointer targets in assignment differ in signedness [-Wpointer-sign] blapitest.c: In function 'finishIO': blapitest.c:982:6: warning: pointer targets in passing argument 2 of 'char2_from_hex' differ in signedness [-Wpointer-sign] blapitest.c:332:1: note: expected 'unsigned char *' but argument is of type 'char *' blapitest.c:992:6: warning: pointer targets in passing argument 2 of 'char2_from_hex' differ in signedness [-Wpointer-sign] blapitest.c:332:1: note: expected 'unsigned char *' but argument is of type 'char *' blapitest.c: In function 'bltest_camellia_init': blapitest.c:1376:9: warning: unused variable 'blocklen' [-Wunused-variable] blapitest.c: In function 'dsaOp': blapitest.c:2167:17: warning: variable 'L100' set but not used [-Wunused-but-set-variable] blapitest.c:2199:17: warning: variable 'L100' set but not used [-Wunused-but-set-variable] blapitest.c:2234:13: warning: variable 'L100' set but not used [-Wunused-but-set-variable] blapitest.c: In function 'cipherDoOp': blapitest.c:2396:50: warning: pointer targets in passing argument 3 of 'cipherInfo->cipher.symmkeyCipher' differ in signedness [-Wpointer-sign] blapitest.c:2396:50: note: expected 'unsigned int *' but argument is of type 'int *' blapitest.c:2407:53: warning: pointer targets in passing argument 3 of 'cipherInfo->cipher.symmkeyCipher' differ in signedness [-Wpointer-sign] blapitest.c:2407:53: note: expected 'unsigned int *' but argument is of type 'int *' blapitest.c:2414:13: warning: variable 'L100' set but not used [-Wunused-but-set-variable] blapitest.c:2422:57: warning: pointer targets in passing argument 3 of 'cipherInfo->cipher.symmkeyCipher' differ in signedness [-Wpointer-sign] blapitest.c:2422:57: note: expected 'unsigned int *' but argument is of type 'int *' blapitest.c:2449:13: warning: variable 'L100' set but not used [-Wunused-but-set-variable] blapitest.c:2483:13: warning: variable 'L100' set but not used [-Wunused-but-set-variable] blapitest.c: In function 'printPR_smpString': blapitest.c:2614:13: warning: variable 'prnRes' set but not used [-Wunused-but-set-variable] blapitest.c: In function 'main': blapitest.c:3485:11: warning: variable 'infileName' set but not used [-Wunused-but-set-variable] blapitest.c:3598:5: warning: 'ret' may be used uninitialized in this function [-Wuninitialized] blapitest.c:3994:30: warning: 'totalTime' may be used uninitialized in this function [-Wuninitialized] blapitest.c:3735:18: warning: 'cipherInfo' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/bltest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/blapitest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/bltest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/btoa' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables btoa.c btoa.c: In function 'encode_file': btoa.c:110:11: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certcgi' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certcgi.c certcgi.c: In function 'MakeV1Cert': certcgi.c:562:15: warning: variable 'rv' set but not used [-Wunused-but-set-variable] certcgi.c: In function 'get_serial_number': certcgi.c:626:6: warning: this decimal constant is unsigned only in ISO C90 [enabled by default] certcgi.c: In function 'string_to_binary': certcgi.c:1452:24: warning: variable 'low_digit' set but not used [-Wunused-but-set-variable] certcgi.c:1451:24: warning: variable 'high_digit' set but not used [-Wunused-but-set-variable] certcgi.c: At top level: certcgi.c:392:1: warning: 'update_data_by_name' defined but not used [-Wunused-function] certcgi.c:420:1: warning: 'update_data_by_index' defined but not used [-Wunused-function] certcgi.c:436:1: warning: 'add_field' defined but not used [-Wunused-function] certcgi.c: In function 'main': certcgi.c:2389:9: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] certcgi.c: In function 'get_serial_number': certcgi.c:622:11: warning: ignoring return value of 'fread', declared with attribute warn_unused_result [-Wunused-result] certcgi.c:635:12: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] certcgi.c:646:12: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certutil' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certext.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certext.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certutil.c certutil.c: In function 'CreateCert': certutil.c:1838:14: warning: variable 'reqDER' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/keystuff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables keystuff.c keystuff.c: In function 'CERTUTIL_GeneratePrivateKey': keystuff.c:531:24: warning: variable 'algtag' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/certext.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/keystuff.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/checkcert' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables checkcert.c checkcert.c: In function 'OurVerifyData': checkcert.c:157:15: warning: variable 'sigAlgTag' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/chktest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables chktest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crlutil' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crlgen_lex.c crlgen_lex_orig.l: In function 'yylex': crlgen_lex_orig.l:144:1: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlgen.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crlgen.c crlgen.c: In function 'crlgen_RmCert': crlgen.c:1114:18: warning: variable 'arena' set but not used [-Wunused-but-set-variable] crlgen.c: In function 'crlgen_CreateInvalidityDate': crlgen.c:659:22: warning: 'mark' may be used uninitialized in this function [-Wuninitialized] crlgen.c: In function 'crlgen_CreateReasonCode': crlgen.c:618:23: warning: 'mark' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables crlutil.c crlutil.c: In function 'main': crlutil.c:840:11: warning: variable 'certFile' set but not used [-Wunused-but-set-variable] crlutil.c:838:13: warning: variable 'privKeyDER' set but not used [-Wunused-but-set-variable] crlutil.c:1096:5: warning: 'rv' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlgen.o Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crmftest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/testcrmf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables testcrmf.c testcrmf.c: In function 'get_serial_number': testcrmf.c:162:16: warning: variable 'rv' set but not used [-Wunused-but-set-variable] testcrmf.c: In function 'main': testcrmf.c:1570:23: warning: variable 'PArg' set but not used [-Wunused-but-set-variable] testcrmf.c:1569:23: warning: variable 'sArg' set but not used [-Wunused-but-set-variable] testcrmf.c:1568:23: warning: variable 'eArg' set but not used [-Wunused-but-set-variable] testcrmf.c:1567:23: warning: variable 'pArg' set but not used [-Wunused-but-set-variable] testcrmf.c: At top level: testcrmf.c:973:1: warning: 'mapWrapKeyType' defined but not used [-Wunused-function] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/testcrmf.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/dbtest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dbtest.c ../modutil/error.h:168:14: warning: 'msgStrings' defined but not used [-Wunused-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/derdump' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables derdump.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/digest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/digest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables digest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/digest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/digest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/digest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/digest' cd fipstest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/fipstest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables fipstest.c fipstest.c: In function 'drbg': fipstest.c:2634:12: warning: variable 'predictionResistance' set but not used [-Wunused-but-set-variable] fipstest.c: At top level: fipstest.c:2572:1: warning: 'alloc_value' defined but not used [-Wunused-function] fipstest.c: In function 'tdea_kat_mmt': fipstest.c:488:16: warning: 'mode' may be used uninitialized in this function [-Wuninitialized] fipstest.c: In function 'aes_kat_mmt': fipstest.c:1148:9: warning: 'keysize' may be used uninitialized in this function [-Wuninitialized] fipstest.c:1148:9: warning: 'mode' may be used uninitialized in this function [-Wuninitialized] fipstest.c: In function 'aes_ecb_mct': fipstest.c:1412:6: warning: 'keysize' may be used uninitialized in this function [-Wuninitialized] fipstest.c: In function 'aes_cbc_mct': fipstest.c:1795:19: warning: 'keysize' may be used uninitialized in this function [-Wuninitialized] fipstest.c: In function 'rng_vst': fipstest.c:3098:19: warning: 'b' may be used uninitialized in this function [-Wuninitialized] fipstest.c: In function 'rng_mct': fipstest.c:3222:19: warning: 'b' may be used uninitialized in this function [-Wuninitialized] fipstest.c: In function 'sha_test': fipstest.c:3422:26: warning: 'msgLen' may be used uninitialized in this function [-Wuninitialized] fipstest.c:3422:26: warning: 'MDlen' may be used uninitialized in this function [-Wuninitialized] fipstest.c: In function 'hmac_test': fipstest.c:3490:13: warning: 'hash_alg' may be used uninitialized in this function [-Wuninitialized] fipstest.c:3535:19: note: 'hash_alg' was declared here fipstest.c:3563:23: warning: 'TLen' may be used uninitialized in this function [-Wuninitialized] fipstest.c:3504:17: warning: 'HMACLen' may be used uninitialized in this function [-Wuninitialized] fipstest.c:3529:18: note: 'HMACLen' was declared here fipstest.c:3519:6: warning: 'keyLen' may be used uninitialized in this function [-Wuninitialized] fipstest.c: In function 'dsa_pqggen_test': fipstest.c:4041:40: warning: 'keySizeIndex' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/fipstest' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/makepqg' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables makepqg.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/multinit' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables multinit.c multinit.c:352:1: warning: 'appendItem' defined but not used [-Wunused-function] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ocspclnt' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ocspclnt.c ocspclnt.c: In function 'main': ocspclnt.c:480:8: warning: 'cert_usage' may be used uninitialized in this function [-Wuninitialized] ocspclnt.c:996:18: note: 'cert_usage' was declared here gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/oidcalc' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables oidcalc.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7content' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p7content.c p7content.c: In function 'PrintBytes': p7content.c:91:12: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7env' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p7env.c p7env.c: In function 'main': p7env.c:167:11: warning: variable 'certName' set but not used [-Wunused-but-set-variable] p7env.c: In function 'EncryptOut': p7env.c:94:11: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7sign' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p7sign.c p7sign.c: In function 'SignOut': p7sign.c:96:11: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] p7sign.c: In function 'main': p7sign.c:295:32: warning: 'cert' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7verify' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables p7verify.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk12util' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk12util.c pk12util.c: In function 'p12u_InitContext': pk12util.c:136:12: warning: variable 'fileExist' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk11mode' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11mode.c pk11mode.c: In function 'PKM_TLSMasterKeyDerive': pk11mode.c:4593:29: warning: variable 'expected_version' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pp' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pp.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pp.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pp -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/pp.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pp ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/rsaperf' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables rsaperf.c rsaperf.c: In function 'main': rsaperf.c:465:27: warning: variable 'certdb' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/defkey.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables defkey.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/defkey.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/sdrtest' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sdrtest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/selfserv' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables selfserv.c selfserv.c: In function 'getBoundListenSocket': selfserv.c:1494:24: warning: variable 'socketDomain' set but not used [-Wunused-but-set-variable] selfserv.c: In function 'handle_connection': selfserv.c:1329:13: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] selfserv.c: In function 'printSecurityInfo': selfserv.c:407:19: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signtool' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables signtool.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/certgen.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables certgen.c certgen.c: In function 'sign_cert': certgen.c:455:11: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] certgen.c: In function 'GetSubjectFromUser': certgen.c:157:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] certgen.c:179:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] certgen.c:198:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] certgen.c:216:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] certgen.c:234:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] certgen.c:255:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] certgen.c:273:10: warning: ignoring return value of 'fgets', declared with attribute warn_unused_result [-Wunused-result] certgen.c: In function 'output_ca_cert': certgen.c:706:9: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/javascript.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables javascript.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables list.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/sign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables sign.c sign.c: In function 'SignOut': sign.c:866:12: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/util.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables util.c util.c: In function 'XP_GetString': util.c:53:5: warning: return discards 'const' qualifier from pointer target type [enabled by default] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/verify.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables verify.c verify.c: In function 'VerifyJar': verify.c:87:11: warning: assignment discards 'const' qualifier from pointer target type [enabled by default] verify.c: In function 'JarWho': verify.c:318:11: warning: assignment discards 'const' qualifier from pointer target type [enabled by default] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/zip.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables zip.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool.o Linux2.6_x86_glibc_PTH_OPT.OBJ/certgen.o Linux2.6_x86_glibc_PTH_OPT.OBJ/javascript.o Linux2.6_x86_glibc_PTH_OPT.OBJ/list.o Linux2.6_x86_glibc_PTH_OPT.OBJ/sign.o Linux2.6_x86_glibc_PTH_OPT.OBJ/util.o Linux2.6_x86_glibc_PTH_OPT.OBJ/verify.o Linux2.6_x86_glibc_PTH_OPT.OBJ/zip.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signver' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/signver.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables signver.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk7print.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk7print.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/signver -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/signver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk7print.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/signver ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables shlibsign.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign.o -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/mangle' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables mangle.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle.o -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/mangle' cd Linux2.6_x86_glibc_PTH_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ" Linux \ "/usr/lib " "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so" /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/./sign.sh: line 25: cd: /usr/lib : No such file or directory /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so Library File: ../../../security/nss/lib/softoken/Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so 883895 bytes Check File: ../../../security/nss/lib/softoken/Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.chk Link: libsoftokn3.chk hash: 20 bytes 16 4b 3c bf 0b ed 34 40 80 57 21 81 15 af 35 a4 fc b9 b1 50 signature: 40 bytes 65 04 e8 5b 59 cf 06 d5 04 72 90 85 5c 88 b1 ea 13 6d 56 9f 94 57 01 df 49 58 73 15 ef 2f b4 f2 b9 21 c7 10 46 73 aa e0 moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... cd Linux2.6_x86_glibc_PTH_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ" Linux \ "/usr/lib " "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so" /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/./sign.sh: line 25: cd: /usr/lib : No such file or directory /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so Library File: ../../../security/nss/lib/freebl/Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 849703 bytes Check File: ../../../security/nss/lib/freebl/Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk Link: libfreebl3.chk hash: 20 bytes c5 ad b2 80 e9 9a 9a 6f 29 9a 93 c7 40 a9 52 63 2c 19 fd c2 signature: 40 bytes 7d e4 3d 05 ff b3 eb b2 f9 fa 4f 48 3f 17 77 21 57 1f 8a e8 62 b1 96 70 3a 4c f9 14 12 43 c3 7f 97 9e ee fe 51 d5 47 16 moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... cd Linux2.6_x86_glibc_PTH_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ" Linux \ "/usr/lib " "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so" /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/./sign.sh: line 25: cd: /usr/lib : No such file or directory /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so Library File: ../../../security/nss/lib/softoken/legacydb/Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so 652871 bytes Check File: ../../../security/nss/lib/softoken/legacydb/Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.chk Link: libnssdbm3.chk hash: 20 bytes 69 1b a5 b7 dc 65 e7 85 7a c8 37 c7 5d 32 02 95 4c ea cc 6d signature: 40 bytes 70 54 4a 8d 57 38 6d 44 65 f5 09 70 bf 5f c2 f8 f5 f0 39 5d 12 61 8d 53 90 d0 c2 9b 7a c4 04 18 19 2b 58 83 ad a5 7f 3e moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/smimetools' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables cmsutil.c cmsutil.c: In function 'main': cmsutil.c:1631:8: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] cmsutil.c: In function 'decode': cmsutil.c:409:12: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] cmsutil.c: In function 'encrypted_data': cmsutil.c:888:11: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ssltap' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ssltap.c ssltap.c: In function 'print_ssl': ssltap.c:1161:9: warning: variable 'l' set but not used [-Wunused-but-set-variable] ssltap.c:1161:7: warning: variable 'i' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/strsclnt' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables strsclnt.c strsclnt.c: In function 'do_connects': strsclnt.c:757:18: warning: variable 'result' set but not used [-Wunused-but-set-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/symkeyutil' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables symkeyutil.c symkeyutil.c: In function 'main': symkeyutil.c:1050:31: warning: unused variable 'rv2' [-Wunused-variable] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tests' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables baddbdir.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables conflict.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables dertimetest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables encodeinttest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables nonspr10.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10 -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables remtest.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest.o \ ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10 Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tstclnt' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables tstclnt.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfychain' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables vfychain.c vfychain.c: In function 'configureRevocationParams': vfychain.c:392:50: warning: 'revFlags' may be used uninitialized in this function [-Wuninitialized] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfyserv' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables vfyserv.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables vfyutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv.o Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyutil.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/modutil' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables modutil.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables pk11.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/instsec.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables instsec.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/install.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables install.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/installparse.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables installparse.c ytab.c: In function 'Pk11Install_yyparse': ytab.c:219:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/install-ds.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables install-ds.c install-ds.c: In function 'Pk11Install_File_Generate': install-ds.c:255:40: warning: comparison with string literal results in unspecified behavior [-Waddress] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables lex.Pk11Install_yy.c lex.Pk11Install_yy.cpp:1060:13: warning: 'Pkcs11Install_yyunput' defined but not used [-Wunused-function] lex.Pk11Install_yy.cpp:1106:12: warning: 'input' defined but not used [-Wunused-function] installparse.l: In function 'Pk11Install_yylex': installparse.l:81:1: warning: ignoring return value of 'fwrite', declared with attribute warn_unused_result [-Wunused-result] gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DUSE_UTIL_DIRECTLY -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil.o Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11.o Linux2.6_x86_glibc_PTH_OPT.OBJ/instsec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/install.o Linux2.6_x86_glibc_PTH_OPT.OBJ/installparse.o Linux2.6_x86_glibc_PTH_OPT.OBJ/install-ds.o Linux2.6_x86_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a -Wl,-rpath,'$ORIGIN/../lib' -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd' make: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss' + NSS_ENABLE_ECC=1 + export NSS_ENABLE_ECC + NSS_ECC_MORE_THAN_SUITE_B=1 + export NSS_ECC_MORE_THAN_SUITE_B + /usr/bin/make -C ./mozilla/security/coreconf make: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf' cd nsinstall; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf/nsinstall' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf/nsinstall' cd nsinstall; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf/nsinstall' true -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf/nsinstall' make: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/coreconf' + /usr/bin/make -C ./mozilla/security/dbm make: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm' cd include; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/include' ../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/include' cd src; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/src' make[1]: Nothing to be done for `export'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/src' cd include; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/include' make[1]: Nothing to be done for `libs'. make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/include' cd src; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/src' ../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libdbm.a ../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm/src' make: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/dbm' + /usr/bin/make -C ./mozilla/security/nss make: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss' cd lib; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib' cd util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/util' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilrename.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h hasht.h sechash.h nsslowhash.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken' cd legacydb; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../../dist/public/nss cd legacydb; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pk11pars.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h pk11init.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/base' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/base' cd dev; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/dev' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pki' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd include; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make private_export make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certdb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certhigh' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pk11wrap' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/cryptohi' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/nss' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ssl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss There are no private exports. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs12' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs7' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/smime' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/crmf' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/jar' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw' cd builtins; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspem.h ../../../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss cd builtins; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make private_export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' There are no private exports. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/sysinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib' cd cmd; /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd' cd lib; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/lib' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secutil.h pk11table.h ../../../../dist/private/nss make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/addbuiltin' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/atob' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/bltest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/btoa' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certcgi' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/checkcert' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/chktest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crlutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crmftest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/dbtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/derdump' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/digest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/digest' cd fipstest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/fipstest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/fipstest' cd makepqg; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/makepqg' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/multinit' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ocspclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/oidcalc' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7content' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7env' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7sign' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7verify' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk12util' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk11mode' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pp' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/rsaperf' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/sdrtest' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/selfserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signtool' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signver' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign' cd mangle; /usr/bin/make export make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/mangle' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/mangle' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/smimetools' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ssltap' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/strsclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/symkeyutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tests' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tstclnt' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfychain' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfyserv' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make export make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/modutil' make[2]: Nothing to be done for `export'. make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib' cd util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/util' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssutil3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/util' cd freebl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libfreebl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib /usr/bin/make FREEBL_CHILD_BUILD=1 \ OBJDIR=Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecl.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecl_curve.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecl_mult.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecl_gf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecp_aff.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecp_jac.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecp_mont.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ec_naf.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecp_jm.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ec2_aff.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ec2_mont.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ec2_proj.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ec2_163.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ec2_193.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ec2_233.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecp_192.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecp_224.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecp_256.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecp_384.c gcc -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -O2 -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -Di386 -DLINUX2_1 -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X86 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DMP_API_COMPATIBLE -I/usr/include/nspr4 -I../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tables ecl/ecp_521.c rm -f Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so gcc -shared -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_163.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_193.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec2_233.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_192.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_224.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o -ldl -lc chmod +x Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/freebl' cd softoken; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsoftokn3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib cd legacydb; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm.a ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdbm3.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken/legacydb' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/softoken' cd base; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/base' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/base' cd dev; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/dev' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssdev.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/dev' cd pki; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pki' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspki.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pki' cd libpkix; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix' cd include; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' make[3]: Nothing to be done for `libs'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/include' cd pkix; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd certsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/certsel' cd crlsel; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/crlsel' cd checker; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/checker' cd params; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/params' cd results; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/results' cd store; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/store' cd top; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/top' cd util; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix/util' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix' cd pkix_pl_nss; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' cd pki; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki' cd system; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system' cd module; /usr/bin/make libs make[4]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' ../../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix/pkix_pl_nss' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/libpkix' cd certdb; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certdb' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcertdb.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certdb' cd certhigh; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certhigh' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcerthi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/certhigh' cd pk11wrap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pk11wrap' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pk11wrap' cd cryptohi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/cryptohi' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/cryptohi' cd nss; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/nss' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnss3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/nss' cd ssl; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ssl' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libssl3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ssl' cd pkcs12; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs12' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs12' cd pkcs7; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs7' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/pkcs7' cd smime; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/smime' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsmime3.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/smime' cd crmf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/crmf' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libcrmf.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/crmf' cd jar; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/jar' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libjar.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/jar' cd ckfw; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib cd builtins; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/builtins' cd pem; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsspem.so ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw/pem' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/ckfw' cd sysinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/sysinit' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib/sysinit' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/lib' cd cmd; /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd' cd lib; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/lib' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux2.6_x86_glibc_PTH_OPT.OBJ/libsectool.a ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/lib' cd addbuiltin; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/addbuiltin' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/addbuiltin ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/addbuiltin' cd atob; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/atob' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/atob ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/atob' cd bltest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/bltest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/bltest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/bltest' cd btoa; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/btoa' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/btoa ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/btoa' cd certcgi; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certcgi' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/certcgi ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certcgi' cd certutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certutil' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/certutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/certutil' cd checkcert; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/checkcert' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/checkcert ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/checkcert' cd chktest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/chktest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/chktest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/chktest' cd crlutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crlutil' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/crlutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crlutil' cd crmftest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crmftest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/crmftest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/crmftest' cd dbtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/dbtest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/dbtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/dbtest' cd derdump; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/derdump' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/derdump ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/derdump' cd digest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/digest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/digest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/digest' cd fipstest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/fipstest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/fipstest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/fipstest' cd makepqg; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/makepqg' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/makepqg ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/makepqg' cd multinit; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/multinit' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/multinit ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/multinit' cd ocspclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ocspclnt' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/ocspclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ocspclnt' cd oidcalc; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/oidcalc' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/oidcalc ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/oidcalc' cd p7content; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7content' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7content ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7content' cd p7env; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7env' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7env ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7env' cd p7sign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7sign' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7sign ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7sign' cd p7verify; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7verify' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/p7verify ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/p7verify' cd pk12util; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk12util' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pk12util ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk12util' cd pk11mode; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk11mode' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pk11mode ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pk11mode' cd pp; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pp' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/pp ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/pp' cd rsaperf; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/rsaperf' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/rsaperf ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/rsaperf' cd sdrtest; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/sdrtest' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/sdrtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/sdrtest' cd selfserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/selfserv' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/selfserv ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/selfserv' cd signtool; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signtool' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/signtool ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signtool' cd signver; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signver' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/signver ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/signver' cd shlibsign; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin cd mangle; /usr/bin/make libs make[3]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/mangle' ../../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/mangle ../../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/mangle' cd Linux2.6_x86_glibc_PTH_OPT.OBJ ; sh "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ" \ "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ" Linux \ "/usr/lib " "/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so" /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/./sign.sh: line 25: cd: /usr/lib : No such file or directory /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/Linux2.6_x86_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so Library File: ../../../security/nss/lib/freebl/Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 850222 bytes Check File: ../../../security/nss/lib/freebl/Linux2.6_x86_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk Link: libfreebl3.chk hash: 20 bytes af e2 76 66 cc 0c 92 78 d6 37 1b 56 8f d3 83 24 f0 c8 52 a2 signature: 40 bytes 5c 62 ef b5 b4 3d d8 a9 5c 2a d0 87 0f f5 78 d8 f4 43 99 4c c0 a1 16 c1 e7 fd 2e 7d c3 b8 df 8c 8f 05 22 a8 b5 84 a6 f9 moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate a DSA key pair ... make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/shlibsign' cd smimetools; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/smimetools' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/cmsutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/smimetools' cd ssltap; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ssltap' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/ssltap ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/ssltap' cd strsclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/strsclnt' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/strsclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/strsclnt' cd symkeyutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/symkeyutil' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/symkeyutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/symkeyutil' cd tests; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tests' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/baddbdir Linux2.6_x86_glibc_PTH_OPT.OBJ/conflict Linux2.6_x86_glibc_PTH_OPT.OBJ/dertimetest Linux2.6_x86_glibc_PTH_OPT.OBJ/encodeinttest Linux2.6_x86_glibc_PTH_OPT.OBJ/nonspr10 Linux2.6_x86_glibc_PTH_OPT.OBJ/remtest ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tests' cd tstclnt; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tstclnt' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/tstclnt ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/tstclnt' cd vfychain; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfychain' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/vfychain ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfychain' cd vfyserv; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfyserv' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/vfyserv ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/vfyserv' cd modutil; /usr/bin/make libs make[2]: Entering directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/modutil' ../../../coreconf/nsinstall/Linux2.6_x86_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux2.6_x86_glibc_PTH_OPT.OBJ/modutil ../../../../dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin make[2]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd/modutil' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/cmd' make: Leaving directory `/builddir/build/BUILD/nss-3.13.1/mozilla/security/nss' + /bin/mkdir -p ./mozilla/dist/pkgconfig + /bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.13.1,g -e s,%NSPR_VERSION%,4.8.9,g -e s,%NSSUTIL_VERSION%,3.13.1,g -e s,%SOFTOKEN_VERSION%,3.12.10,g ++ cat mozilla/security/nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat mozilla/security/nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=13 ++ cat mozilla/security/nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=1 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,13,g -e s,@MOD_PATCH_VERSION@,1,g + chmod 755 ./mozilla/dist/pkgconfig/nss-config + /bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./mozilla/dist/pkgconfig/setup-nsssysinit.sh + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.z3Lbyr + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386 '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386 ++ dirname /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386 + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386 + cd nss-3.13.1 + LANG=C + export LANG + unset DISPLAY + /bin/rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386 + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/pkgconfig + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + for file in libnss3.so libnssckbi.so libnsspem.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + /bin/mkdir -p /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin + for file in certutil cmsutil crlutil modutil pk12util signtool signver ssltap + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in atob btoa derdump ocspclnt pp selfserv strsclnt symkeyutil tstclnt vfyserv vfychain + /usr/bin/install -p -m 755 mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/nss/unsupported-tools + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/base64.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/blapit.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ciferfam.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ecl-exp.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/hasht.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssb64.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssb64t.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssilckt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssilock.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nsslocks.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nsslowhash.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nsspem.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssrwlk.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssrwlkt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/nssutil.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11f.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11n.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11p.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11t.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs11u.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/portreg.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secasn1.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secasn1t.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/seccomon.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secder.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdert.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdig.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secdigt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secerr.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secitem.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secoid.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secoidt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/secport.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/shsign.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + for file in 'mozilla/dist/public/nss/*.h' + /usr/bin/install -p -m 644 mozilla/dist/public/nss/utilrename.h /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3 + /usr/bin/install -p -m 644 ./mozilla/dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/lib/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./mozilla/dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin/nss-config + /usr/bin/install -p -m 755 ./mozilla/dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/bin/setup-nsssysinit.sh + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/base64.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/ciferfam.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/nssb64.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/nssb64t.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/nsslocks.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/nssilock.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/nssilckt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/nssrwlk.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/nssrwlkt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/nssutil.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/pkcs11.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/pkcs11f.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/pkcs11n.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/pkcs11p.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/pkcs11t.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/pkcs11u.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/portreg.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secasn1.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secasn1t.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/seccomon.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secder.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secdert.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secdig.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secdigt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secerr.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secitem.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secoid.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secoidt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secport.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/utilrename.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/alghmac.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/blapit.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/ecl-exp.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/hasht.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/sechash.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/secmodt.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/shsign.h + rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386//usr/include/nss3/nsslowhash.h + /usr/lib/rpm/find-debuginfo.sh --strict-build-id /builddir/build/BUILD/nss-3.13.1 extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/libnsspem.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/bin/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386/usr/bin/signver cpio: nss-3.13.1/mozilla/security/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.13.1/mozilla/security/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 25733 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.Qw8hVU + umask 022 + cd /builddir/build/BUILD + cd nss-3.13.1 + unset DISPLAY + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + BUILD_OPT=1 + export BUILD_OPT ++ find ./mozilla/security/nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' + MYRAND=9519 + echo 9519 9519 selfserv_9519 + RANDSERV=selfserv_9519 + echo selfserv_9519 ++ ls -d ./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin + echo ./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin ./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin ++ pwd + pushd /builddir/build/BUILD/nss-3.13.1 ~/build/BUILD/nss-3.13.1 ~/build/BUILD/nss-3.13.1 + cd ./mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9519 + popd ~/build/BUILD/nss-3.13.1 + find ./mozilla/security/nss/tests -type f + grep -v '\.db$' + grep -v '\.crl$' + grep -vw CVS + xargs grep -lw selfserv + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9519/g' + grep -v '\.crt$' + killall selfserv_9519 selfserv_9519: no process found + : + rm -rf ./mozilla/tests_results + cd ./mozilla/security/nss/tests/ + HOST=localhost + DOMSUF=localdomain + PORT=9519 + NSS_CYCLES= + NSS_TESTS= + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh testdir is /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security which: no domainname in (.:/builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/root/bin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin) ******************************************** Platform: Linux2.6_x86_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/root/bin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib: Running tests for cipher TIMESTAMP cipher BEGIN: Tue Nov 8 16:11:36 UTC 2011 cipher.sh: Cipher Tests =============================== cipher.sh: DES ECB Encrypt -------------------------------- bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des_ecb passed. bltest -T -m des_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des_ecb passed. cipher.sh: #1: DES ECB Encrypt - PASSED cipher.sh: DES ECB Decrypt -------------------------------- bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des_ecb passed. bltest -T -m des_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des_ecb passed. cipher.sh: #2: DES ECB Decrypt - PASSED cipher.sh: DES CBC Encrypt -------------------------------- bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des_cbc passed. bltest -T -m des_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des_cbc passed. cipher.sh: #3: DES CBC Encrypt - PASSED cipher.sh: DES CBC Decrypt -------------------------------- bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des_cbc passed. bltest -T -m des_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des_cbc passed. cipher.sh: #4: DES CBC Decrypt - PASSED cipher.sh: DES3 ECB Encrypt -------------------------------- bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des3_ecb passed. bltest -T -m des3_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des3_ecb passed. cipher.sh: #5: DES3 ECB Encrypt - PASSED cipher.sh: DES3 ECB Decrypt -------------------------------- bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des3_ecb passed. bltest -T -m des3_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des3_ecb passed. cipher.sh: #6: DES3 ECB Decrypt - PASSED cipher.sh: DES3 CBC Encrypt -------------------------------- bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for des3_cbc passed. bltest -T -m des3_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for des3_cbc passed. cipher.sh: #7: DES3 CBC Encrypt - PASSED cipher.sh: DES3 CBC Decrypt -------------------------------- bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for des3_cbc passed. bltest -T -m des3_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for des3_cbc passed. cipher.sh: #8: DES3 CBC Decrypt - PASSED cipher.sh: AES ECB Encrypt -------------------------------- bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_ecb passed. bltest -T -m aes_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_ecb passed. cipher.sh: #9: AES ECB Encrypt - PASSED cipher.sh: AES ECB Decrypt -------------------------------- bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for aes_ecb passed. bltest -T -m aes_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for aes_ecb passed. cipher.sh: #10: AES ECB Decrypt - PASSED cipher.sh: AES CBC Encrypt -------------------------------- bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for aes_cbc passed. bltest -T -m aes_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for aes_cbc passed. cipher.sh: #11: AES CBC Encrypt - PASSED cipher.sh: AES CBC Decrypt -------------------------------- bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for aes_cbc passed. bltest -T -m aes_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for aes_cbc passed. cipher.sh: #12: AES CBC Decrypt - PASSED cipher.sh: Camellia ECB Encrypt -------------------------------- bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. Encryption self-test for camellia_ecb passed. cipher.sh: #13: Camellia ECB Encrypt - PASSED cipher.sh: Camellia ECB Decrypt -------------------------------- bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. bltest -T -m camellia_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. Decryption self-test for camellia_ecb passed. cipher.sh: #14: Camellia ECB Decrypt - PASSED cipher.sh: Camellia CBC Encrypt -------------------------------- bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. Encryption self-test for camellia_cbc passed. cipher.sh: #15: Camellia CBC Encrypt - PASSED cipher.sh: Camellia CBC Decrypt -------------------------------- bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. bltest -T -m camellia_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. Decryption self-test for camellia_cbc passed. cipher.sh: #16: Camellia CBC Decrypt - PASSED cipher.sh: SEED ECB Encrypt -------------------------------- bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for seed_ecb passed. bltest -T -m seed_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for seed_ecb passed. cipher.sh: #17: SEED ECB Encrypt - PASSED cipher.sh: SEED ECB Decrypt -------------------------------- bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for seed_ecb passed. bltest -T -m seed_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for seed_ecb passed. cipher.sh: #18: SEED ECB Decrypt - PASSED cipher.sh: SEED CBC Encrypt -------------------------------- bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for seed_cbc passed. bltest -T -m seed_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for seed_cbc passed. cipher.sh: #19: SEED CBC Encrypt - PASSED cipher.sh: SEED CBC Decrypt -------------------------------- bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for seed_cbc passed. bltest -T -m seed_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for seed_cbc passed. cipher.sh: #20: SEED CBC Decrypt - PASSED cipher.sh: RC2 ECB Encrypt -------------------------------- bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc2_ecb passed. cipher.sh: #21: RC2 ECB Encrypt - PASSED cipher.sh: RC2 ECB Decrypt -------------------------------- bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc2_ecb passed. bltest -T -m rc2_ecb -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc2_ecb passed. cipher.sh: #22: RC2 ECB Decrypt - PASSED cipher.sh: RC2 CBC Encrypt -------------------------------- bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc2_cbc passed. cipher.sh: #23: RC2 CBC Encrypt - PASSED cipher.sh: RC2 CBC Decrypt -------------------------------- bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc2_cbc passed. bltest -T -m rc2_cbc -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc2_cbc passed. cipher.sh: #24: RC2 CBC Decrypt - PASSED cipher.sh: RC4 Encrypt -------------------------------- bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. bltest -T -m rc4 -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rc4 passed. Encryption self-test for rc4 passed. cipher.sh: #25: RC4 Encrypt - PASSED cipher.sh: RC4 Decrypt -------------------------------- bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. bltest -T -m rc4 -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rc4 passed. Decryption self-test for rc4 passed. cipher.sh: #26: RC4 Decrypt - PASSED cipher.sh: RSA Encrypt -------------------------------- bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Encryption self-test for rsa passed. bltest -T -m rsa -E -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Encryption self-test for rsa passed. cipher.sh: #27: RSA Encrypt - PASSED cipher.sh: RSA Decrypt -------------------------------- bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Decryption self-test for rsa passed. bltest -T -m rsa -D -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Decryption self-test for rsa passed. cipher.sh: #28: RSA Decrypt - PASSED cipher.sh: DSA Sign -------------------------------- bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Signature self-test for dsa passed. bltest -T -m dsa -S -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Signature self-test for dsa passed. cipher.sh: #29: DSA Sign - PASSED cipher.sh: DSA Verify -------------------------------- bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Verification self-test for dsa passed. bltest -T -m dsa -V -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Verification self-test for dsa passed. cipher.sh: #30: DSA Verify - PASSED cipher.sh: MD2 Hash -------------------------------- bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for md2 passed. bltest -T -m md2 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for md2 passed. cipher.sh: #31: MD2 Hash - PASSED cipher.sh: MD5 Hash -------------------------------- bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for md5 passed. bltest -T -m md5 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for md5 passed. cipher.sh: #32: MD5 Hash - PASSED cipher.sh: SHA1 Hash -------------------------------- bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha1 passed. bltest -T -m sha1 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha1 passed. cipher.sh: #33: SHA1 Hash - PASSED cipher.sh: SHA224 Hash -------------------------------- bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha224 passed. Hash self-test for sha224 passed. bltest -T -m sha224 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha224 passed. Hash self-test for sha224 passed. cipher.sh: #34: SHA224 Hash - PASSED cipher.sh: SHA256 Hash -------------------------------- bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha256 passed. Hash self-test for sha256 passed. bltest -T -m sha256 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha256 passed. Hash self-test for sha256 passed. cipher.sh: #35: SHA256 Hash - PASSED cipher.sh: SHA384 Hash -------------------------------- bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha384 passed. Hash self-test for sha384 passed. bltest -T -m sha384 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha384 passed. Hash self-test for sha384 passed. cipher.sh: #36: SHA384 Hash - PASSED cipher.sh: SHA512 Hash -------------------------------- bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6 Hash self-test for sha512 passed. Hash self-test for sha512 passed. bltest -T -m sha512 -H -d /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7 Hash self-test for sha512 passed. Hash self-test for sha512 passed. cipher.sh: #37: SHA512 Hash - PASSED TIMESTAMP cipher END: Tue Nov 8 16:11:53 UTC 2011 Running tests for libpkix TIMESTAMP libpkix BEGIN: Tue Nov 8 16:11:53 UTC 2011 TIMESTAMP libpkix END: Tue Nov 8 16:11:53 UTC 2011 Running tests for cert TIMESTAMP cert BEGIN: Tue Nov 8 16:11:53 UTC 2011 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #38: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #39: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #40: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #41: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -o root.cert cert.sh: #42: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #43: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #44: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #45: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #46: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #47: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #48: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #49: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #50: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #51: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #52: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #53: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #54: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #55: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #56: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #57: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #58: Exporting Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #59: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #60: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #63: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #64: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert cert.sh: #65: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #66: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert cert.sh: #67: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #68: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #69: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #70: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #71: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert cert.sh: #72: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #73: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert cert.sh: #74: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #75: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert cert.sh: #76: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #77: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #78: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #79: Import Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #80: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #81: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert cert.sh: #82: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #83: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #84: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #85: Import Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #86: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #87: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #88: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #89: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #90: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert cert.sh: #91: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #92: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #93: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #94: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #95: Import Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #96: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #97: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert cert.sh: #98: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #99: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #100: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #101: Import Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #102: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #103: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert cert.sh: #104: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #105: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #106: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #107: Import Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #108: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #109: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert cert.sh: #110: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #111: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #112: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #113: Import Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #114: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #115: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert cert.sh: #116: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #117: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #118: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #119: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #120: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #121: Import Eve's cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #122: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #123: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #124: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... cert.sh: #125: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #126: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #127: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #128: Import Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #129: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #130: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert cert.sh: #131: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:c9 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:11:58 2011 Not After : Wed Feb 08 16:11:58 2012 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:30:14:5b:57:cf:b6:9e:b1:7e:7f:7c:c4:99:2d:08: f0:07:1b:37:fd:2b:42:36:c9:c2:38:15:db:72:2e:c5: b6:5a:18:b6:c1:92:88:87:85:48:92:42:8d:2c:20:d0: 7b:92:24:55:b3:32:b8:3e:70:10:e9:8d:8f:2f:2f:4c: c8:d5:be:8d:52:8d:7c:94:62:01:20:6f:98:b4:89:8a: ce:12:4f:64:3f:b7:16:97:68:f4:68:0e:0c:d4:43:da: 83:39:89:20:a0:31:dc:9f:cd:0e:aa:ba:a3:ee:62:7a: 0d:bf:cb:99:f3:ac:24:da:9b:f6:cd:7f:92:ce:d6:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 81:7d:07:b2:1c:2a:cf:50:83:3d:f0:3a:2a:0b:01:5f: a8:e7:cc:01:fe:46:3f:2a:41:88:cf:50:7a:48:60:94: 09:b2:e9:21:84:2e:58:5d:77:17:80:85:66:c2:b8:2e: 9d:9f:f4:d9:4d:9e:3f:a4:06:3e:6e:63:40:99:db:e8: f7:9c:55:a7:64:ab:3d:09:61:16:a2:8d:37:77:d5:f6: ca:e5:ca:ac:00:e8:89:1c:26:47:71:43:37:fb:7a:14: e7:01:dc:8c:6e:09:cf:55:a7:47:92:d5:bc:4c:40:1c: 7d:a5:cb:19:26:e3:ea:6f:8c:2f:d0:bc:72:a6:0f:ef Fingerprint (MD5): E7:AF:EE:8E:1A:EA:A5:F7:E4:DD:95:76:38:F9:77:49 Fingerprint (SHA1): 93:0C:0D:77:7B:C5:59:30:DA:89:AD:59:B6:5A:8A:CE:40:BF:80:61 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #132: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:ca Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:11:59 2011 Not After : Wed Feb 08 16:11:59 2012 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:25:16:35:38:7c:6a:12:9f:4d:79:d9:3a:48:53:8e: 6f:d9:8f:35:f2:4d:a6:70:96:91:25:97:4d:81:45:94: be:7d:21:d0:a5:60:33:bb:d5:5e:16:d9:ac:77:0b:2f: 50:8d:04:e0:fe:36:52:f9:48:35:8f:3d:2c:0f:3c:2b: e5:5e:24:6b:1e:d7:2b:20:3c:c9:9e:d8:42:83:67:d0: e7:18:a1:6e:67:38:6c:ac:9c:a9:f0:da:2e:f6:7d:88: 11:6d:06:5b:fd:5c:e9:54:e0:64:1f:0d:a6:fe:e8:51: ab:d6:02:81:86:5f:15:9b:4b:09:d4:24:ab:db:df:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9a:57:c9:f6:8a:21:b7:28:1f:24:0f:fa:9a:50:ce:6f: c6:39:c7:19:eb:ba:dd:d8:a9:cf:ae:a7:b5:fd:1b:78: 97:77:89:9d:a4:36:0c:04:73:ea:f2:71:b4:d4:c8:3c: e9:4e:8e:76:a6:c2:6e:52:18:30:a7:7e:62:c9:57:88: 05:7b:fa:92:c0:eb:54:7a:a0:5a:8c:17:f5:17:6e:00: db:fb:9e:78:34:c1:b6:cf:37:65:46:1f:75:70:5d:62: aa:02:d8:a7:f8:e9:8c:34:dd:9f:6c:c4:5b:92:5b:90: 32:fd:79:08:95:59:4b:fa:4f:75:2d:2f:25:c6:38:1d Fingerprint (MD5): 53:40:3E:33:10:78:40:F3:EA:3F:F0:E6:86:69:8A:F0 Fingerprint (SHA1): E8:9B:2A:7D:DC:DE:90:A8:22:53:B9:A4:60:E1:45:B0:CB:43:F8:AD Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #133: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:ca Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:11:59 2011 Not After : Wed Feb 08 16:11:59 2012 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:1f:7d:86:e1:93:71:37:46:ec:ca:96:e6:72:44:0a: d9:78:2a:9e:c1:67:5e:62:d5:e3:93:b9:48:3d:06:88: 39:6e:e6:7b:15:c8:f7:9e:fc:2c:ca:fc:92:be:21:7d: 87:80:82:e5:cd:d9:11:fb:98:96:3b:9e:13:93:98:71: 84:2e:97:25:51:b4:47:ba:c7:e4:9c:56:28:43:b0:8e: e8:b6:32:56:2a:73:5e:04:de:7b:00:12:3c:a0:ca:ed: 71:90:69:76:03:de:c1:b6:12:39:f6:00:10:b4:51:34: b6:98:69:39:75:42:bb:f2:85:9a:8b:f8:61:ea:77:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0e:30:a1:ee:7a:11:e9:72:3d:c5:2e:f9:54:1b:de:97: d5:8b:20:18:a4:19:bf:ef:bf:19:d1:2d:df:2d:6f:a5: bf:8e:60:a0:cf:ce:c2:da:64:18:55:3b:b6:09:0d:be: a2:93:b3:61:1b:26:08:62:fe:71:65:c0:ca:7a:a9:cf: 0d:2c:99:96:e3:6e:34:42:a7:ff:cd:ce:f2:fa:9a:f9: 18:da:bf:bc:b7:12:08:0e:66:a5:03:52:99:d2:59:1a: 46:74:82:97:d5:fc:96:7a:d2:65:b5:94:1f:d0:2f:4c: d2:01:da:51:22:f0:49:38:af:71:d9:dd:cb:d9:0f:da Fingerprint (MD5): 83:E7:84:8B:46:DD:95:BA:7E:AE:BE:67:BE:B7:BF:03 Fingerprint (SHA1): D3:E3:F0:2F:F8:D5:94:95:A2:7B:24:FC:1D:1D:C2:57:10:9C:E8:78 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #134: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:cb Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:11:59 2011 Not After : Wed Feb 08 16:11:59 2012 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f5:26:1b:25:a9:e3:73:2c:d3:f6:c9:23:9b:7d:81: 9d:ee:aa:0c:8b:37:82:bd:c6:d8:21:99:d1:35:59:6a: d8:85:27:9e:76:25:1d:e6:a6:7e:80:d7:e0:d0:6c:9d: 19:25:11:c6:d2:08:3f:eb:ee:4d:f7:3c:58:f4:7f:4e: 0e:f9:29:c8:ee:3f:9c:4c:a5:57:e3:d5:8b:f7:76:db: 5b:9a:45:95:f0:45:af:62:a9:3f:79:db:cf:cc:85:ca: 3d:1d:78:47:22:3f:33:93:52:2b:49:7f:c6:42:42:86: fe:d5:ef:43:8f:1d:8c:45:d6:eb:b7:68:14:9b:9d:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 03:25:14:e3:f2:9a:4f:8f:88:41:22:cc:2a:35:8c:6b: 7a:d3:44:b7:eb:d3:80:ea:80:27:2f:29:8b:c9:b9:ff: c7:af:3e:d6:65:fc:f8:f5:45:f5:c4:e7:3e:cd:5c:dd: 8d:59:c3:9e:ec:f1:c0:23:bd:81:69:0a:e2:48:7e:ca: f1:12:73:91:57:80:e0:24:70:4d:cd:37:22:e9:34:42: a7:1a:da:cc:62:99:cb:ec:64:28:d7:ce:1b:a0:4a:f7: 7e:68:8f:03:60:b0:7c:fa:6c:27:48:a5:a6:53:96:da: ab:c4:cc:58:cd:53:55:1b:7e:1c:5f:4c:00:5b:35:fe Fingerprint (MD5): 3B:2C:12:E4:FB:AA:C1:F1:5C:79:9A:3A:B3:63:B7:5A Fingerprint (SHA1): A7:4C:C0:12:68:5B:F3:7B:52:06:DD:9C:1C:34:14:02:50:8D:A0:46 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #135: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:cb Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:11:59 2011 Not After : Wed Feb 08 16:11:59 2012 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:12:6a:c7:01:04:cc:d8:49:7b:96:3e:47:43:c3:90: d9:ac:43:c0:1e:7f:e7:63:b1:f9:d4:40:9b:9d:db:19: ff:c2:64:e5:b5:47:b7:19:b2:87:86:8d:6b:a4:2c:b5: 0f:94:ea:f3:7b:3d:7f:50:30:f2:e8:67:5e:9b:c2:fb: b7:7f:e6:e7:55:68:e1:c3:a3:91:ee:b8:c5:49:11:03: 48:2f:c5:d5:08:fb:6b:bd:70:ed:b0:20:db:ca:da:b1: 14:dd:c8:1c:83:db:42:eb:bc:18:66:65:1a:70:c5:b4: 14:26:3e:b8:2f:8a:ea:cf:0f:1d:74:ec:54:77:cb:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 49:14:de:0c:2d:e2:5f:a3:be:b2:86:54:9f:94:37:5e: dc:50:c8:a2:9e:0f:fe:44:1b:95:58:bc:12:6b:c3:96: 27:97:b0:92:dd:1d:ad:17:e1:14:d4:b2:dc:f8:29:aa: d9:06:99:77:f8:05:cc:8b:1d:4b:50:40:14:22:bf:2b: ac:9e:92:af:aa:ab:90:30:32:86:5a:ee:5d:24:2d:bb: 33:90:ac:85:8a:5e:d3:e4:f9:52:07:ef:5d:9b:d1:19: 47:b7:e7:3b:1b:78:67:8b:c1:48:52:05:fa:a7:e5:a1: 60:09:7f:bf:e0:67:e7:4b:2e:e3:53:19:d2:41:4a:76 Fingerprint (MD5): 91:33:09:09:56:C7:95:75:4D:4F:7C:75:1F:B5:B5:DB Fingerprint (SHA1): 54:D7:2C:95:63:B6:92:36:33:B4:5C:C3:2B:22:12:F0:4D:9F:81:A1 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #136: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:cc Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:12:00 2011 Not After : Wed Feb 08 16:12:00 2012 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:23:cc:6b:8a:7f:71:93:21:f3:81:70:75:a0:67:49: 57:ee:a3:2f:77:43:c0:9f:e4:09:13:d8:4b:e6:5f:a6: 7b:9f:f9:e4:fe:09:c3:6f:2e:cd:8a:aa:a2:67:b9:82: 8e:51:de:9c:57:01:3e:cd:bf:b4:1d:48:cb:26:6b:40: b6:2d:31:99:15:d9:aa:2d:34:de:6a:ef:b7:00:08:49: 13:78:8d:ee:23:b8:d2:07:a0:9e:93:76:bd:41:71:7f: 44:ae:ce:ec:de:2d:96:5e:44:84:01:b2:38:90:b3:07: 18:de:92:8a:b7:e0:ae:a1:98:78:70:8e:c9:24:0c:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1e:8d:d1:68:01:2b:9a:49:93:f8:53:2f:13:67:42:2b: 00:97:12:6a:9f:c3:f6:04:94:22:ce:63:0c:51:4b:c3: a9:a1:60:16:cc:dd:c4:25:95:ff:fd:7d:a3:cb:87:bf: 4c:75:96:84:29:d2:84:98:c2:b1:00:4e:8b:4b:55:a5: 06:92:24:f6:5f:ea:ff:ef:6c:57:04:97:66:ab:f8:8f: d0:4d:f1:2b:4e:c3:b0:62:8c:fb:c0:25:58:5e:08:67: eb:3f:3a:a0:f2:88:7b:12:cb:7b:5f:ab:b9:35:39:55: b4:5b:27:5e:e9:65:33:81:bc:f1:e5:9d:e6:80:8a:77 Fingerprint (MD5): A7:25:0F:F1:48:52:69:47:E8:90:BE:D9:77:C4:97:3E Fingerprint (SHA1): E1:49:0C:30:87:D2:6D:44:97:D3:A3:F7:CA:F9:78:3A:2D:D5:8A:DD Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #137: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:cd Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:12:00 2011 Not After : Wed Feb 08 16:12:00 2012 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:c7:dc:6e:4a:d2:4a:b4:a6:08:08:62:70:1e:7f:fa: 7d:6c:c9:91:51:f7:3e:34:ed:57:a3:98:d2:28:9e:1e: 0e:fd:6c:c4:51:19:23:bf:b9:fc:1b:9c:39:d9:c7:5e: 2b:0d:e3:0a:b4:4d:df:81:f6:19:8b:df:ad:21:43:89: f4:88:0a:50:42:c4:1d:3b:59:63:2a:ed:f9:2f:0d:55: d2:e0:58:b7:02:71:7a:15:21:3a:6d:70:27:f4:5c:82: 86:34:a2:0c:94:25:83:56:bc:72:ec:67:05:eb:9f:2a: f0:8a:9b:33:c3:06:60:dc:f8:f6:ad:6f:b6:06:ff:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 65:b7:88:fa:d9:04:a0:01:ee:6e:e3:61:e1:85:47:cf: e8:06:70:50:36:f5:af:be:f6:22:6f:45:31:8b:fe:b0: 6d:d2:71:c7:13:92:60:e2:20:e9:28:1c:80:7e:b7:b2: 65:05:30:0d:ee:00:16:0a:a0:13:d1:27:26:a5:60:50: d7:ee:53:6e:49:98:c0:8e:17:06:a6:f4:88:ab:b0:b8: 2f:5e:fd:c3:e5:2b:14:e5:55:b1:b2:bc:a5:51:1d:97: 35:73:db:24:86:80:8a:b8:e6:13:05:93:77:1b:d3:32: f8:71:09:48:29:e2:a1:8d:27:d6:ba:79:07:4a:92:76 Fingerprint (MD5): B0:63:F4:93:12:29:AD:4A:8F:C9:D3:B8:F3:7F:B8:36 Fingerprint (SHA1): 55:3F:AC:99:48:0E:3C:08:FF:88:CE:58:3A:E1:22:EA:73:86:27:BC Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #138: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:cd Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:12:00 2011 Not After : Wed Feb 08 16:12:00 2012 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:52:be:84:81:f3:56:8f:ec:a1:2a:02:af:76:7d:9e: 3a:1d:77:46:23:1e:1a:28:4f:57:3b:04:6c:a4:69:af: c9:ba:d9:e6:c7:cf:38:17:2d:bc:3b:94:95:2e:02:48: 10:4b:83:90:b0:8e:35:bd:91:55:18:00:98:fb:e9:83: 9c:d8:98:db:c3:68:62:df:97:ac:25:24:fa:c6:24:cd: 4a:fa:6d:ec:aa:9b:20:54:67:26:8e:48:10:e3:32:d7: 86:53:25:05:22:04:c7:04:a0:f4:d5:cd:98:af:43:2f: e5:41:fe:1c:32:26:0b:b5:1a:ca:04:25:d6:02:97:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7e:9c:82:52:4a:d5:58:d4:75:3d:2b:e8:0a:a9:61:0f: 72:a9:ba:ca:9a:36:db:2f:bb:5c:99:85:dd:ee:05:0a: 7d:07:38:25:04:dd:07:e2:03:54:df:60:fb:5a:dc:cc: 32:56:85:ee:8a:e9:08:a9:59:06:82:f3:57:19:27:d2: 68:ba:78:f1:da:40:33:75:d3:09:0c:52:5a:33:e3:d0: 56:02:3d:1d:d4:42:bf:ca:d7:c3:98:80:97:1f:f3:72: 6a:c7:1c:15:3d:d7:26:62:74:fe:ee:cc:00:0d:53:a2: 1e:bf:df:af:f5:6c:cc:22:a4:2a:bc:b9:33:28:86:58 Fingerprint (MD5): BE:B1:54:06:45:B3:D5:61:1F:BF:94:99:C8:15:C0:AC Fingerprint (SHA1): 96:93:34:87:40:48:54:D2:23:34:0B:57:A6:89:2E:6E:37:52:40:17 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #139: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:cd Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:12:00 2011 Not After : Wed Feb 08 16:12:00 2012 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:55:1b:1b:23:82:eb:21:3a:e4:07:f3:be:ff:2f:1b: cd:4e:95:b9:a2:af:be:45:a5:2f:46:dd:9b:2e:73:91: f1:31:86:f8:0e:6c:1e:d3:0a:fa:fd:74:e9:bd:8d:e6: 52:32:87:2c:89:23:79:56:32:e7:6b:3a:c1:4c:62:e3: 9b:b0:ff:7e:e2:84:cf:37:72:61:0c:ae:76:d4:9a:37: d9:59:17:55:61:6c:68:50:29:ab:e8:b4:69:ed:bb:c6: 6c:6b:cf:fd:7e:da:37:c6:e0:d9:93:04:ad:da:d4:94: 48:b9:d5:66:22:ba:e5:5d:ba:ff:4b:41:95:b3:62:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: de:c1:19:79:15:08:e2:dd:81:0e:33:6b:40:94:0b:69: 33:77:aa:c1:2e:ce:bf:e2:50:a2:8c:e3:bc:0c:02:21: b1:a5:80:da:11:85:fe:32:ae:48:49:8b:bb:14:ba:c6: 95:3e:e9:0a:7e:b1:e8:0d:87:8d:c1:d0:67:f4:cc:eb: 1f:91:6b:07:1c:2e:8f:f5:04:7e:71:f3:09:83:7f:27: da:84:b9:3f:13:a7:ae:ec:ab:35:0b:06:88:83:60:b3: 68:06:74:31:a5:8a:b8:69:ca:94:78:96:3d:1c:f2:e8: 41:2b:ce:78:a2:3b:06:6e:c9:0b:33:eb:c4:22:9b:12 Fingerprint (MD5): 3D:29:F3:8C:FE:DC:5E:CF:91:6F:36:FA:E4:58:B1:47 Fingerprint (SHA1): 1E:EB:90:A3:EF:75:0F:A6:72:47:70:C9:03:B3:26:7A:A1:B0:49:F5 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #140: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:ce Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:12:01 2011 Not After : Wed Feb 08 16:12:01 2012 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:6a:01:d8:88:cd:39:10:a9:d9:02:9b:48:a1:83:aa: 63:95:f5:d5:ba:4d:e1:6e:f4:10:04:ca:ba:e8:89:34: 75:6f:ca:17:a4:bc:d5:70:1a:92:4f:ca:26:8e:74:8f: 08:f2:ca:53:82:4f:ad:4c:a5:02:f8:ff:75:82:d1:bf: 1c:77:56:76:1f:d0:dc:03:75:99:fa:a5:15:dc:1b:da: db:32:60:91:66:08:1c:1e:34:f3:a3:29:7e:18:86:ca: 98:c4:d3:ea:a0:60:77:15:6d:06:03:d2:f7:bf:4f:3f: 8b:6f:fb:85:fb:e2:f9:1c:fc:44:1e:28:a6:1f:e7:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: af:30:58:93:69:bd:b1:3e:b9:43:f6:1b:9e:5f:98:73: 74:4f:2a:f8:13:bf:f7:db:38:ff:95:16:5d:47:43:80: fb:a7:89:ee:49:58:3c:9f:96:6e:8f:cc:fb:1d:29:1d: 24:a8:bf:0f:c0:94:f5:43:1d:1f:db:62:23:99:cb:fe: 36:c2:25:85:a3:45:57:35:6b:6e:cf:1a:2f:ab:33:50: 2b:42:81:32:fe:51:2a:b8:ce:35:ad:c4:2f:ef:d3:1f: b4:e1:03:40:31:93:51:fc:93:40:de:55:cc:ab:e5:09: a7:e8:1d:29:8b:0a:8c:3a:e4:fd:f0:ac:48:4e:5f:85 Fingerprint (MD5): 4A:3F:AF:0A:68:51:21:79:D9:E5:7E:23:BA:00:AA:CC Fingerprint (SHA1): 62:7A:71:15:0C:5A:CB:E5:BF:B8:14:C9:67:AE:78:5C:FF:23:9F:14 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #141: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6d:cf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:12:01 2011 Not After : Wed Feb 08 16:12:01 2012 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:f1:d0:42:95:97:91:8c:de:22:94:e9:4c:7f:25:f7: d2:a0:eb:2a:93:d7:40:78:5f:df:b4:1f:c9:f6:a6:9f: 61:59:7f:5e:c1:97:74:49:09:49:0f:8f:40:f8:a3:90: 31:d2:5b:d2:87:5f:fc:82:d7:6f:ee:83:f0:e9:d5:69: 98:23:ed:fc:75:d3:47:d9:6f:d0:43:90:51:4b:e7:da: e2:08:e1:da:8d:e0:61:66:59:14:68:82:5c:96:7f:7a: 97:47:02:3e:d5:30:d9:b6:ca:00:4e:77:79:ca:64:b4: 8c:11:29:87:27:a8:19:0f:44:ca:02:b5:5e:5e:9b:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2e:ba:90:27:fb:6e:e4:b9:85:be:d2:4b:05:e6:37:23: 9b:e4:c9:0f:b7:73:90:d0:4c:68:ae:1c:22:23:6b:43: f2:09:75:3a:3d:3b:a2:0c:b8:a0:af:97:d5:33:40:e2: 38:c3:f3:46:8d:bf:1e:0f:02:89:58:47:e0:5e:fa:19: c0:ee:18:b5:02:0c:96:5d:fe:d0:51:d3:88:73:13:06: 79:2f:f0:e7:9b:8d:a9:4b:e1:e0:7e:73:e0:81:dd:e4: 4b:55:1a:23:79:86:e5:84:f3:db:51:72:9d:46:2d:36: f9:a7:51:0e:7a:2e:22:6e:29:58:98:b9:20:53:06:62 Fingerprint (MD5): D2:FE:3B:C0:77:A4:E0:0A:66:A0:1B:6F:E1:16:19:4F Fingerprint (SHA1): A9:0F:E6:F9:FB:D2:B7:84:99:C6:03:5E:E5:4F:2B:9D:11:D7:29:0F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #142: Certificate Key Usage Extension (11) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #143: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #144: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #145: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #146: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #147: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... cert.sh: #148: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #149: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #150: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #151: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #152: Import Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #153: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #154: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert cert.sh: #155: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #156: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #157: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -o root.cert cert.sh: #158: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #159: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #160: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: `./req' and `/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #161: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert cert.sh: #162: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #163: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #164: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #165: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #166: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #167: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #168: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #169: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #170: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #171: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #172: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #173: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #174: Verify Distrusted Cert for Object Signer - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #176: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert cert.sh: #177: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #178: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #179: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert cert.sh: #180: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #181: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #182: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert cert.sh: #183: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #184: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #185: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert cert.sh: #186: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #187: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #188: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert cert.sh: #189: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #190: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #191: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert cert.sh: #192: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #193: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #194: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert cert.sh: #195: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #196: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #197: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert cert.sh: #198: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #199: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #200: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert cert.sh: #201: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #202: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #203: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert cert.sh: #204: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #205: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #206: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert cert.sh: #207: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #208: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #209: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert cert.sh: #210: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #211: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #212: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert cert.sh: #213: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #214: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #215: Modify CRL by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #216: Modify CRL by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #217: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #218: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. cert.sh: #219: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #220: Importing CRL for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Tue Nov 8 16:12:15 UTC 2011 Running tests for dbtests TIMESTAMP dbtests BEGIN: Tue Nov 8 16:12:15 UTC 2011 ./dbtests.sh: line 206: syntax error near unexpected token `then' ./dbtests.sh: line 206: ` if [[ $EUID -ne 0 ]] then' TIMESTAMP dbtests END: Tue Nov 8 16:12:15 UTC 2011 Running tests for tools TIMESTAMP tools BEGIN: Tue Nov 8 16:12:15 UTC 2011 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:b0:bd:47:3b:3e:37:5c:69:b0:1e:03:b2:a0:d8:cd Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #222: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #223: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #224: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a4:d3:3f:76:3a:20:03:9c:c5:93:66:c8:94:d5:f0:0c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #225: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #226: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #227: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c9:a6:e6:47:76:4e:ea:63:a9:52:08:c9:32:39:f7:78 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #228: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #229: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #230: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 90:f1:88:56:46:c0:06:ad:13:2d:fe:26:13:57:21:d4 Iteration Count: 1 (0x1) tools.sh: #231: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 79:00:84:7a:51:6b:d4:4f:ef:42:6a:71:a2:8e:20:d4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #234: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #235: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #236: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5d:eb:10:1d:bb:e8:3e:12:86:db:a1:b5:dc:21:94:7a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #237: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #238: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #239: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:8d:61:b6:10:b0:90:1d:1f:e7:b5:25:cf:57:9c:56 Iteration Count: 1 (0x1) tools.sh: #240: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #241: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #242: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a1:86:48:4c:a2:27:3d:e2:05:54:1a:2d:64:c2:2e:da Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:e3:1b:15:c5:fd:2b:e3:b0:b5:c8:1e:aa:d2:ed: d1:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b7:7e:78:17:a7:05:30:40:d3:e8:49:02:a7:a8:c9:74 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:cb:5d:84:66:d8:25:58:a2:1b:92:a4:75:01:8a: 14:aa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #246: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #247: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #248: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8d:2c:f7:88:c6:c9:6c:7b:ba:3c:ad:e1:f4:56:89:bf Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:2f:6b:f4:36:2f:b5:88:a2:0e:77:5f:0d:04:b7: c2:07 tools.sh: #249: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #250: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #251: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:8e:c0:bb:63:d7:72:3b:0a:1f:4a:10:49:cc:d8:c3 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:9e:91:9c:38:a1:69:3e:df:92:1b:59:02:7b:d8: 77:f4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #252: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #253: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #254: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6b:b0:40:33:d6:03:6e:8c:d6:01:3f:62:5b:9e:61:d6 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:60:0d:b2:ac:80:6f:4a:8c:f9:cd:9a:17:50:54: b9:ea Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:3a:2a:59:4f:f6:db:ee:30:b1:ca:63:10:e1:44:cb Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:23:61:18:5b:16:aa:24:b2:a4:7e:fd:3a:18:c6: f5:fc tools.sh: #258: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #259: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #260: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b5:bf:04:31:15:45:8e:94:70:d0:9e:5e:7f:7f:02:e7 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d4:5f:c1:d7:92:68:42:9b:9c:ae:36:31:98:41: df:ff Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #261: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #262: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #263: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b8:ee:b7:0e:4d:92:fa:5b:40:d1:2f:bf:76:78:82:7b Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:90:67:15:2e:1b:d5:cf:2e:cc:25:80:37:aa:1e: 3b:b6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #264: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #265: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #266: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0e:7a:c7:54:c6:e5:2e:3a:62:58:6b:07:16:a6:0b:94 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:04:06:7a:be:0c:72:ee:16:b5:cd:f0:4d:f1:dc: 31:7e tools.sh: #267: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 78:9e:7f:af:8a:59:0e:87:a3:f2:b1:8a:41:d0:7b:c7 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:4d:1a:ea:7c:b1:81:32:74:6b:2e:87:db:a9:ef: 13:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #270: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #271: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #272: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 20:5e:35:ef:f2:fe:d9:38:56:12:98:2b:2d:76:6a:36 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:1f:54:60:57:5a:98:2d:4e:d1:c0:88:74:7a:c9: 28:64 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #273: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #274: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #275: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:11:de:82:ce:7e:a4:82:69:c8:8b:48:ee:93:40:38 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:bc:88:eb:0e:3a:f3:a4:e3:21:b9:c4:bc:29:76: 2d:ea tools.sh: #276: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #277: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #278: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:c8:8c:80:39:3a:be:93:04:74:48:0f:f8:54:6b:21 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:d1:49:e8:a8:b9:a4:ac:fe:7f:99:c0:66:8a:12: 72:d6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:b1:f4:e1:b6:6c:bd:b2:2f:93:a9:5a:bd:fe:15:42 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:07:b2:5c:2a:b0:af:de:7b:54:d0:c6:b9:85:cb: 37:e9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #282: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #283: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #284: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 93:a5:f3:d2:68:a4:93:14:91:6f:0f:37:66:ff:fe:70 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:94:8f:f8:f9:a8:c0:cf:cb:d3:5b:fd:4e:56:5b: fd:0f tools.sh: #285: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #286: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #287: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:33:8c:a2:c9:d7:86:aa:23:a0:4e:1f:6d:a4:0e:14 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:f7:d8:47:32:2f:b2:3d:ed:2b:fa:e6:fa:24:98: 41:15 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #288: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #289: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #290: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fb:61:42:c7:db:1c:0f:e5:03:06:a1:39:e1:54:c1:f2 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:5f:a2:2c:2c:8d:a9:3f:62:46:ec:e6:45:74:90: 8f:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a8:ed:2c:d0:53:f1:c0:f0:04:59:34:bc:15:78:19:3f Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:39:90:f4:34:4f:fd:dd:26:48:d8:2b:b8:e5:22: 06:dc tools.sh: #294: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #295: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #296: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 7c:93:09:c4:b2:1b:94:fa:ed:f5:3a:81:1f:27:de:ff Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #297: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #298: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #299: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: fa:17:f2:15:91:6c:ef:1b:23:23:b2:d9:66:3a:a1:6a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #300: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #301: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #302: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 09:0e:84:2d:51:98:7d:34:35:5e:74:66:54:76:16:1b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 57:c6:83:9e:f1:df:82:9a:d5:15:43:df:5c:83:7c:48 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #306: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #307: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #308: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d6:15:26:0f:29:90:55:52:c4:2c:70:36:e4:9f:2c:59 Iteration Count: 1 (0x1) tools.sh: #309: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #310: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #311: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 42:da:0c:09:e6:d4:97:4a:f7:f2:9f:5d:9b:df:d6:2b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #312: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #313: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #314: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: df:9d:bf:74:0c:e9:b5:85:27:8f:2c:c8:53:b9:a4:4f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 7d:b3:ce:94:23:36:c1:02:00:bf:2f:31:b8:aa:91:66 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #318: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #319: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #320: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 91:62:a2:39:24:1f:94:99:b3:64:11:79:61:59:2c:fd Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #321: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #322: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #323: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: d3:16:ee:46:6f:9b:f9:24:76:4d:2b:08:f0:8b:76:d0 Iteration Count: 1 (0x1) tools.sh: #324: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #325: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #326: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 38:59:7b:ea:ee:d9:2f:ab:51:7a:2e:3f:a8:72:f6:fd Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a9:34:9a:09:b8:83:c4:5a:6b:66:fa:fe:23:01:05:49 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #330: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #331: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #332: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 70:1a:2e:49:ab:d0:58:37:8a:60:d5:2e:00:23:0d:bc Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #333: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #334: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #335: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e5:6b:9e:23:6b:63:38:95:f6:38:ee:f8:72:48:5d:d4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #336: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #337: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #338: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 06:3c:34:4e:62:8c:54:b6:69:4c:18:c5:e9:4d:8c:a6 Iteration Count: 1 (0x1) tools.sh: #339: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 98:ea:78:f1:4b:02:2f:0b:61:77:8e:64:ba:8f:43:a6 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #342: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #343: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #344: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ac:f7:84:7f:36:38:5a:df:86:ef:55:50:94:d4:c2:33 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #345: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #346: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #347: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:fd:78:21:11:0a:52:26:be:04:bd:fb:9e:33:7e:f0 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #348: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #349: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #350: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: af:2f:03:68:90:c5:54:02:2d:a6:1c:ee:26:e1:e9:1a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #351: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2b:af:b0:ba:5f:e4:cc:f0:3c:22:e6:2b:bf:2f:95:f3 Iteration Count: 1 (0x1) tools.sh: #354: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #355: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #356: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fb:f5:9e:f1:f3:37:cf:03:79:c5:bb:45:88:43:80:76 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #357: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #358: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #359: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 81:b2:58:5a:12:c0:c9:2a:a7:a9:f7:be:f3:50:c3:0e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #360: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #361: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #362: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:e9:85:ed:11:79:58:92:6a:05:7d:99:c3:eb:d5:06 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:72:e0:e8:7c:ca:9c:06:23:20:f7:91:ad:d5:aa:87 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #366: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #367: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #368: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 25:62:a0:16:90:5b:d8:bc:29:17:c7:50:10:d1:7a:07 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #369: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #370: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #371: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:40:1f:7f:34:89:a2:93:5a:90:36:6c:bf:d4:65:76 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #372: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #373: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #374: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 33:7c:e0:e6:2c:10:bd:03:da:b3:de:af:f6:75:91:d7 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e7:7d:1b:59:00:a0:9b:aa:aa:38:54:d2:a2:ac:1b:fb Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #378: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #379: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #380: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bf:41:75:59:d4:19:ec:6b:91:5a:1e:b7:12:72:93:6b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #381: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #382: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #383: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: db:b2:2e:0b:17:5a:31:66:cd:8e:4a:a2:82:c1:e6:9d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #384: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #385: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #386: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #387: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #388: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #389: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #390: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #391: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #392: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #393: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #394: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Tue Nov 8 16:12:18 UTC 2011 Running tests for fips TIMESTAMP fips BEGIN: Tue Nov 8 16:12:18 UTC 2011 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #395: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #396: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa cfe47c60c61238885552063846b0ebc7be10fc1a NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #397: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #398: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #399: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #400: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #401: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #402: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #403: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #404: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #405: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #406: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #407: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa cfe47c60c61238885552063846b0ebc7be10fc1a FIPS_PUB_140_Test_Certificate fips.sh: #408: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #409: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #410: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #411: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #412: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa cfe47c60c61238885552063846b0ebc7be10fc1a FIPS_PUB_140_Test_Certificate fips.sh: #413: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #414: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #415: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000d7caf (883887): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #416: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Tue Nov 8 16:12:28 UTC 2011 Running tests for sdr TIMESTAMP sdr BEGIN: Tue Nov 8 16:12:28 UTC 2011 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.v1.18966 -t "Test1" sdr.sh: #417: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.v2.18966 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #418: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.v3.18966 -t "1234567" sdr.sh: #419: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.v1.18966 -t "Test1" sdr.sh: #420: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.v2.18966 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #421: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.v3.18966 -t "1234567" sdr.sh: #422: Decrypt - Value 3 - PASSED TIMESTAMP sdr END: Tue Nov 8 16:12:28 UTC 2011 Running tests for crmf TIMESTAMP crmf BEGIN: Tue Nov 8 16:12:28 UTC 2011 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #423: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #424: CMMF test . - PASSED TIMESTAMP crmf END: Tue Nov 8 16:12:28 UTC 2011 Running tests for smime TIMESTAMP smime BEGIN: Tue Nov 8 16:12:28 UTC 2011 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #425: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #426: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #427: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #428: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #429: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #430: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #431: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #432: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #433: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #434: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #435: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #436: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #437: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #438: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #439: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #440: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #441: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #442: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #443: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #444: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #445: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #446: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #447: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #448: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #449: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #450: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #451: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #452: Decrypt with a Multiple Email cert . - PASSED smime.sh: #453: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #454: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #455: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #456: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #457: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #458: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #459: Decode Encrypted-Data . - PASSED smime.sh: #460: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #461: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #462: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #463: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #464: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #465: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Tue Nov 8 16:12:29 UTC 2011 Running tests for ssl TIMESTAMP ssl BEGIN: Tue Nov 8 16:12:29 UTC 2011 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 496 >/dev/null 2>/dev/null selfserv_9519 with PID 496 found at Tue Nov 8 16:12:29 UTC 2011 selfserv_9519 with PID 496 started at Tue Nov 8 16:12:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #466: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 496 at Tue Nov 8 16:12:29 UTC 2011 kill -USR1 496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 496 killed at Tue Nov 8 16:12:29 UTC 2011 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 552 >/dev/null 2>/dev/null selfserv_9519 with PID 552 found at Tue Nov 8 16:12:29 UTC 2011 selfserv_9519 with PID 552 started at Tue Nov 8 16:12:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #467: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 552 at Tue Nov 8 16:12:30 UTC 2011 kill -USR1 552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 552 killed at Tue Nov 8 16:12:30 UTC 2011 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 608 >/dev/null 2>/dev/null selfserv_9519 with PID 608 found at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 with PID 608 started at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #468: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 608 at Tue Nov 8 16:12:30 UTC 2011 kill -USR1 608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 608 killed at Tue Nov 8 16:12:30 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 676 >/dev/null 2>/dev/null selfserv_9519 with PID 676 found at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 with PID 676 started at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #469: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 676 at Tue Nov 8 16:12:30 UTC 2011 kill -USR1 676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 676 killed at Tue Nov 8 16:12:30 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 735 >/dev/null 2>/dev/null selfserv_9519 with PID 735 found at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 with PID 735 started at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #470: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 735 at Tue Nov 8 16:12:30 UTC 2011 kill -USR1 735 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 735 killed at Tue Nov 8 16:12:30 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 791 >/dev/null 2>/dev/null selfserv_9519 with PID 791 found at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 with PID 791 started at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #471: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 791 at Tue Nov 8 16:12:30 UTC 2011 kill -USR1 791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 791 killed at Tue Nov 8 16:12:30 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 859 >/dev/null 2>/dev/null selfserv_9519 with PID 859 found at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 with PID 859 started at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #472: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 859 at Tue Nov 8 16:12:30 UTC 2011 kill -USR1 859 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 859 killed at Tue Nov 8 16:12:30 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 915 >/dev/null 2>/dev/null selfserv_9519 with PID 915 found at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 with PID 915 started at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #473: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 915 at Tue Nov 8 16:12:30 UTC 2011 kill -USR1 915 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 915 killed at Tue Nov 8 16:12:30 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 978 >/dev/null 2>/dev/null selfserv_9519 with PID 978 found at Tue Nov 8 16:12:30 UTC 2011 selfserv_9519 with PID 978 started at Tue Nov 8 16:12:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #474: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 978 at Tue Nov 8 16:12:31 UTC 2011 kill -USR1 978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 978 killed at Tue Nov 8 16:12:31 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1046 >/dev/null 2>/dev/null selfserv_9519 with PID 1046 found at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 with PID 1046 started at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #475: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 1046 at Tue Nov 8 16:12:31 UTC 2011 kill -USR1 1046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1046 killed at Tue Nov 8 16:12:31 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1102 >/dev/null 2>/dev/null selfserv_9519 with PID 1102 found at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 with PID 1102 started at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #476: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 1102 at Tue Nov 8 16:12:31 UTC 2011 kill -USR1 1102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1102 killed at Tue Nov 8 16:12:31 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1158 >/dev/null 2>/dev/null selfserv_9519 with PID 1158 found at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 with PID 1158 started at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #477: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 1158 at Tue Nov 8 16:12:31 UTC 2011 kill -USR1 1158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1158 killed at Tue Nov 8 16:12:31 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1228 >/dev/null 2>/dev/null selfserv_9519 with PID 1228 found at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 with PID 1228 started at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #478: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 1228 at Tue Nov 8 16:12:31 UTC 2011 kill -USR1 1228 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1228 killed at Tue Nov 8 16:12:31 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1285 >/dev/null 2>/dev/null selfserv_9519 with PID 1285 found at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 with PID 1285 started at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #479: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 1285 at Tue Nov 8 16:12:31 UTC 2011 kill -USR1 1285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1285 killed at Tue Nov 8 16:12:31 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1341 >/dev/null 2>/dev/null selfserv_9519 with PID 1341 found at Tue Nov 8 16:12:31 UTC 2011 selfserv_9519 with PID 1341 started at Tue Nov 8 16:12:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #480: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 1341 at Tue Nov 8 16:12:32 UTC 2011 kill -USR1 1341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1341 killed at Tue Nov 8 16:12:32 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1416 >/dev/null 2>/dev/null selfserv_9519 with PID 1416 found at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 with PID 1416 started at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #481: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 1416 at Tue Nov 8 16:12:32 UTC 2011 kill -USR1 1416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1416 killed at Tue Nov 8 16:12:32 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1476 >/dev/null 2>/dev/null selfserv_9519 with PID 1476 found at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 with PID 1476 started at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #482: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 1476 at Tue Nov 8 16:12:32 UTC 2011 kill -USR1 1476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1476 killed at Tue Nov 8 16:12:32 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1534 >/dev/null 2>/dev/null selfserv_9519 with PID 1534 found at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 with PID 1534 started at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #483: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 1534 at Tue Nov 8 16:12:32 UTC 2011 kill -USR1 1534 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1534 killed at Tue Nov 8 16:12:32 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1605 >/dev/null 2>/dev/null selfserv_9519 with PID 1605 found at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 with PID 1605 started at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #484: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 1605 at Tue Nov 8 16:12:32 UTC 2011 kill -USR1 1605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1605 killed at Tue Nov 8 16:12:32 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1661 >/dev/null 2>/dev/null selfserv_9519 with PID 1661 found at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 with PID 1661 started at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #485: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 1661 at Tue Nov 8 16:12:32 UTC 2011 kill -USR1 1661 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1661 killed at Tue Nov 8 16:12:32 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1718 >/dev/null 2>/dev/null selfserv_9519 with PID 1718 found at Tue Nov 8 16:12:32 UTC 2011 selfserv_9519 with PID 1718 started at Tue Nov 8 16:12:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #486: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 1718 at Tue Nov 8 16:12:32 UTC 2011 kill -USR1 1718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1718 killed at Tue Nov 8 16:12:32 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1792 >/dev/null 2>/dev/null selfserv_9519 with PID 1792 found at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 with PID 1792 started at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #487: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 1792 at Tue Nov 8 16:12:33 UTC 2011 kill -USR1 1792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1792 killed at Tue Nov 8 16:12:33 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1848 >/dev/null 2>/dev/null selfserv_9519 with PID 1848 found at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 with PID 1848 started at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #488: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 1848 at Tue Nov 8 16:12:33 UTC 2011 kill -USR1 1848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1848 killed at Tue Nov 8 16:12:33 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1904 >/dev/null 2>/dev/null selfserv_9519 with PID 1904 found at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 with PID 1904 started at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #489: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 1904 at Tue Nov 8 16:12:33 UTC 2011 kill -USR1 1904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1904 killed at Tue Nov 8 16:12:33 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 1972 >/dev/null 2>/dev/null selfserv_9519 with PID 1972 found at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 with PID 1972 started at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #490: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 1972 at Tue Nov 8 16:12:33 UTC 2011 kill -USR1 1972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 1972 killed at Tue Nov 8 16:12:33 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2028 >/dev/null 2>/dev/null selfserv_9519 with PID 2028 found at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 with PID 2028 started at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #491: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2028 at Tue Nov 8 16:12:33 UTC 2011 kill -USR1 2028 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2028 killed at Tue Nov 8 16:12:33 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2084 >/dev/null 2>/dev/null selfserv_9519 with PID 2084 found at Tue Nov 8 16:12:33 UTC 2011 selfserv_9519 with PID 2084 started at Tue Nov 8 16:12:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #492: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 2084 at Tue Nov 8 16:12:33 UTC 2011 kill -USR1 2084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2084 killed at Tue Nov 8 16:12:33 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2152 >/dev/null 2>/dev/null selfserv_9519 with PID 2152 found at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 with PID 2152 started at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #493: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 2152 at Tue Nov 8 16:12:34 UTC 2011 kill -USR1 2152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2152 killed at Tue Nov 8 16:12:34 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2208 >/dev/null 2>/dev/null selfserv_9519 with PID 2208 found at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 with PID 2208 started at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #494: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 2208 at Tue Nov 8 16:12:34 UTC 2011 kill -USR1 2208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2208 killed at Tue Nov 8 16:12:34 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2264 >/dev/null 2>/dev/null selfserv_9519 with PID 2264 found at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 with PID 2264 started at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #495: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 2264 at Tue Nov 8 16:12:34 UTC 2011 kill -USR1 2264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2264 killed at Tue Nov 8 16:12:34 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2332 >/dev/null 2>/dev/null selfserv_9519 with PID 2332 found at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 with PID 2332 started at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #496: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 2332 at Tue Nov 8 16:12:34 UTC 2011 kill -USR1 2332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2332 killed at Tue Nov 8 16:12:34 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2388 >/dev/null 2>/dev/null selfserv_9519 with PID 2388 found at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 with PID 2388 started at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #497: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 2388 at Tue Nov 8 16:12:34 UTC 2011 kill -USR1 2388 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2388 killed at Tue Nov 8 16:12:34 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2444 >/dev/null 2>/dev/null selfserv_9519 with PID 2444 found at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 with PID 2444 started at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #498: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 2444 at Tue Nov 8 16:12:34 UTC 2011 kill -USR1 2444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2444 killed at Tue Nov 8 16:12:34 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2512 >/dev/null 2>/dev/null selfserv_9519 with PID 2512 found at Tue Nov 8 16:12:34 UTC 2011 selfserv_9519 with PID 2512 started at Tue Nov 8 16:12:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #499: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 2512 at Tue Nov 8 16:12:35 UTC 2011 kill -USR1 2512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2512 killed at Tue Nov 8 16:12:35 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2568 >/dev/null 2>/dev/null selfserv_9519 with PID 2568 found at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 with PID 2568 started at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #500: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2568 at Tue Nov 8 16:12:35 UTC 2011 kill -USR1 2568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2568 killed at Tue Nov 8 16:12:35 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2624 >/dev/null 2>/dev/null selfserv_9519 with PID 2624 found at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 with PID 2624 started at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #501: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 2624 at Tue Nov 8 16:12:35 UTC 2011 kill -USR1 2624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2624 killed at Tue Nov 8 16:12:35 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2692 >/dev/null 2>/dev/null selfserv_9519 with PID 2692 found at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 with PID 2692 started at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #502: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2692 at Tue Nov 8 16:12:35 UTC 2011 kill -USR1 2692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2692 killed at Tue Nov 8 16:12:35 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2748 >/dev/null 2>/dev/null selfserv_9519 with PID 2748 found at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 with PID 2748 started at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #503: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2748 at Tue Nov 8 16:12:35 UTC 2011 kill -USR1 2748 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2748 killed at Tue Nov 8 16:12:35 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2804 >/dev/null 2>/dev/null selfserv_9519 with PID 2804 found at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 with PID 2804 started at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #504: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2804 at Tue Nov 8 16:12:35 UTC 2011 kill -USR1 2804 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2804 killed at Tue Nov 8 16:12:35 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2872 >/dev/null 2>/dev/null selfserv_9519 with PID 2872 found at Tue Nov 8 16:12:35 UTC 2011 selfserv_9519 with PID 2872 started at Tue Nov 8 16:12:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #505: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2872 at Tue Nov 8 16:12:36 UTC 2011 kill -USR1 2872 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2872 killed at Tue Nov 8 16:12:36 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2928 >/dev/null 2>/dev/null selfserv_9519 with PID 2928 found at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 with PID 2928 started at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #506: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2928 at Tue Nov 8 16:12:36 UTC 2011 kill -USR1 2928 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2928 killed at Tue Nov 8 16:12:36 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2984 >/dev/null 2>/dev/null selfserv_9519 with PID 2984 found at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 with PID 2984 started at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #507: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2984 at Tue Nov 8 16:12:36 UTC 2011 kill -USR1 2984 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2984 killed at Tue Nov 8 16:12:36 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3052 >/dev/null 2>/dev/null selfserv_9519 with PID 3052 found at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 with PID 3052 started at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #508: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3052 at Tue Nov 8 16:12:36 UTC 2011 kill -USR1 3052 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3052 killed at Tue Nov 8 16:12:36 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3108 >/dev/null 2>/dev/null selfserv_9519 with PID 3108 found at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 with PID 3108 started at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #509: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3108 at Tue Nov 8 16:12:36 UTC 2011 kill -USR1 3108 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3108 killed at Tue Nov 8 16:12:36 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3164 >/dev/null 2>/dev/null selfserv_9519 with PID 3164 found at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 with PID 3164 started at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #510: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3164 at Tue Nov 8 16:12:36 UTC 2011 kill -USR1 3164 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3164 killed at Tue Nov 8 16:12:36 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3232 >/dev/null 2>/dev/null selfserv_9519 with PID 3232 found at Tue Nov 8 16:12:36 UTC 2011 selfserv_9519 with PID 3232 started at Tue Nov 8 16:12:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #511: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3232 at Tue Nov 8 16:12:37 UTC 2011 kill -USR1 3232 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3232 killed at Tue Nov 8 16:12:37 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3288 >/dev/null 2>/dev/null selfserv_9519 with PID 3288 found at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 with PID 3288 started at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #512: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3288 at Tue Nov 8 16:12:37 UTC 2011 kill -USR1 3288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3288 killed at Tue Nov 8 16:12:37 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3344 >/dev/null 2>/dev/null selfserv_9519 with PID 3344 found at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 with PID 3344 started at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #513: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3344 at Tue Nov 8 16:12:37 UTC 2011 kill -USR1 3344 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3344 killed at Tue Nov 8 16:12:37 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3412 >/dev/null 2>/dev/null selfserv_9519 with PID 3412 found at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 with PID 3412 started at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #514: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3412 at Tue Nov 8 16:12:37 UTC 2011 kill -USR1 3412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3412 killed at Tue Nov 8 16:12:37 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3468 >/dev/null 2>/dev/null selfserv_9519 with PID 3468 found at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 with PID 3468 started at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #515: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3468 at Tue Nov 8 16:12:37 UTC 2011 kill -USR1 3468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3468 killed at Tue Nov 8 16:12:37 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3524 >/dev/null 2>/dev/null selfserv_9519 with PID 3524 found at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 with PID 3524 started at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #516: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3524 at Tue Nov 8 16:12:37 UTC 2011 kill -USR1 3524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3524 killed at Tue Nov 8 16:12:37 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3592 >/dev/null 2>/dev/null selfserv_9519 with PID 3592 found at Tue Nov 8 16:12:37 UTC 2011 selfserv_9519 with PID 3592 started at Tue Nov 8 16:12:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #517: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3592 at Tue Nov 8 16:12:38 UTC 2011 kill -USR1 3592 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3592 killed at Tue Nov 8 16:12:38 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3649 >/dev/null 2>/dev/null selfserv_9519 with PID 3649 found at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 with PID 3649 started at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #518: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3649 at Tue Nov 8 16:12:38 UTC 2011 kill -USR1 3649 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3649 killed at Tue Nov 8 16:12:38 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3705 >/dev/null 2>/dev/null selfserv_9519 with PID 3705 found at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 with PID 3705 started at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #519: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3705 at Tue Nov 8 16:12:38 UTC 2011 kill -USR1 3705 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3705 killed at Tue Nov 8 16:12:38 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3773 >/dev/null 2>/dev/null selfserv_9519 with PID 3773 found at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 with PID 3773 started at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #520: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3773 at Tue Nov 8 16:12:38 UTC 2011 kill -USR1 3773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3773 killed at Tue Nov 8 16:12:38 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3829 >/dev/null 2>/dev/null selfserv_9519 with PID 3829 found at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 with PID 3829 started at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #521: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3829 at Tue Nov 8 16:12:38 UTC 2011 kill -USR1 3829 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3829 killed at Tue Nov 8 16:12:38 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3885 >/dev/null 2>/dev/null selfserv_9519 with PID 3885 found at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 with PID 3885 started at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #522: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3885 at Tue Nov 8 16:12:38 UTC 2011 kill -USR1 3885 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3885 killed at Tue Nov 8 16:12:38 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3957 >/dev/null 2>/dev/null selfserv_9519 with PID 3957 found at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 with PID 3957 started at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #523: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3957 at Tue Nov 8 16:12:38 UTC 2011 kill -USR1 3957 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3957 killed at Tue Nov 8 16:12:38 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4013 >/dev/null 2>/dev/null selfserv_9519 with PID 4013 found at Tue Nov 8 16:12:38 UTC 2011 selfserv_9519 with PID 4013 started at Tue Nov 8 16:12:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #524: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4013 at Tue Nov 8 16:12:39 UTC 2011 kill -USR1 4013 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4013 killed at Tue Nov 8 16:12:39 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4069 >/dev/null 2>/dev/null selfserv_9519 with PID 4069 found at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 with PID 4069 started at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #525: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4069 at Tue Nov 8 16:12:39 UTC 2011 kill -USR1 4069 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4069 killed at Tue Nov 8 16:12:39 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4137 >/dev/null 2>/dev/null selfserv_9519 with PID 4137 found at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 with PID 4137 started at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #526: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4137 at Tue Nov 8 16:12:39 UTC 2011 kill -USR1 4137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4137 killed at Tue Nov 8 16:12:39 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4193 >/dev/null 2>/dev/null selfserv_9519 with PID 4193 found at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 with PID 4193 started at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #527: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4193 at Tue Nov 8 16:12:39 UTC 2011 kill -USR1 4193 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4193 killed at Tue Nov 8 16:12:39 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4249 >/dev/null 2>/dev/null selfserv_9519 with PID 4249 found at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 with PID 4249 started at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #528: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4249 at Tue Nov 8 16:12:39 UTC 2011 kill -USR1 4249 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4249 killed at Tue Nov 8 16:12:39 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4317 >/dev/null 2>/dev/null selfserv_9519 with PID 4317 found at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 with PID 4317 started at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4317 at Tue Nov 8 16:12:39 UTC 2011 kill -USR1 4317 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4317 killed at Tue Nov 8 16:12:39 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4373 >/dev/null 2>/dev/null selfserv_9519 with PID 4373 found at Tue Nov 8 16:12:39 UTC 2011 selfserv_9519 with PID 4373 started at Tue Nov 8 16:12:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4373 at Tue Nov 8 16:12:40 UTC 2011 kill -USR1 4373 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4373 killed at Tue Nov 8 16:12:40 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4429 >/dev/null 2>/dev/null selfserv_9519 with PID 4429 found at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 with PID 4429 started at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4429 at Tue Nov 8 16:12:40 UTC 2011 kill -USR1 4429 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4429 killed at Tue Nov 8 16:12:40 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4497 >/dev/null 2>/dev/null selfserv_9519 with PID 4497 found at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 with PID 4497 started at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #532: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4497 at Tue Nov 8 16:12:40 UTC 2011 kill -USR1 4497 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4497 killed at Tue Nov 8 16:12:40 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4553 >/dev/null 2>/dev/null selfserv_9519 with PID 4553 found at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 with PID 4553 started at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #533: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4553 at Tue Nov 8 16:12:40 UTC 2011 kill -USR1 4553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4553 killed at Tue Nov 8 16:12:40 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4609 >/dev/null 2>/dev/null selfserv_9519 with PID 4609 found at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 with PID 4609 started at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #534: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4609 at Tue Nov 8 16:12:40 UTC 2011 kill -USR1 4609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4609 killed at Tue Nov 8 16:12:40 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4677 >/dev/null 2>/dev/null selfserv_9519 with PID 4677 found at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 with PID 4677 started at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #535: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4677 at Tue Nov 8 16:12:40 UTC 2011 kill -USR1 4677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4677 killed at Tue Nov 8 16:12:40 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4734 >/dev/null 2>/dev/null selfserv_9519 with PID 4734 found at Tue Nov 8 16:12:40 UTC 2011 selfserv_9519 with PID 4734 started at Tue Nov 8 16:12:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #536: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4734 at Tue Nov 8 16:12:41 UTC 2011 kill -USR1 4734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4734 killed at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4790 >/dev/null 2>/dev/null selfserv_9519 with PID 4790 found at Tue Nov 8 16:12:41 UTC 2011 selfserv_9519 with PID 4790 started at Tue Nov 8 16:12:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #537: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4790 at Tue Nov 8 16:12:41 UTC 2011 kill -USR1 4790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4790 killed at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9519 starting at Tue Nov 8 16:12:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 selfserv_9519 with PID 4862 started at Tue Nov 8 16:12:41 UTC 2011 Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #538: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #539: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #540: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #541: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #542: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #543: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #544: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #545: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #546: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #547: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #548: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #549: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:41 UTC 2011 ssl.sh: #550: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #551: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #552: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #553: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #554: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #555: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #556: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #557: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #558: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #559: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #560: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #561: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #562: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #563: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #564: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #565: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #566: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #567: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #568: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #569: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #570: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:42 UTC 2011 ssl.sh: #571: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #572: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #573: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #574: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #575: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #576: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #577: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 4862 >/dev/null 2>/dev/null selfserv_9519 with PID 4862 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #578: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4862 at Tue Nov 8 16:12:43 UTC 2011 kill -USR1 4862 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4862 killed at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:43 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 selfserv_9519 with PID 6282 started at Tue Nov 8 16:12:43 UTC 2011 Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #579: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #580: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #581: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #582: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #583: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #584: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #585: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #586: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #587: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:43 UTC 2011 ssl.sh: #588: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #589: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #590: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #591: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #592: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #593: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #594: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #595: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #596: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #597: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #598: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #599: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #600: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #601: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #602: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #603: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #604: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #605: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #606: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #607: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #608: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:44 UTC 2011 ssl.sh: #609: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #610: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #611: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #612: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #613: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #614: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #615: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #616: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #617: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #618: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6282 >/dev/null 2>/dev/null selfserv_9519 with PID 6282 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #619: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6282 at Tue Nov 8 16:12:45 UTC 2011 kill -USR1 6282 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6282 killed at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7702 >/dev/null 2>/dev/null selfserv_9519 with PID 7702 found at Tue Nov 8 16:12:45 UTC 2011 selfserv_9519 with PID 7702 started at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 7702 at Tue Nov 8 16:12:45 UTC 2011 kill -USR1 7702 ./ssl.sh: line 207: 7702 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7702 killed at Tue Nov 8 16:12:45 UTC 2011 selfserv_9519 starting at Tue Nov 8 16:12:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:45 UTC 2011 selfserv_9519 with PID 7744 started at Tue Nov 8 16:12:45 UTC 2011 Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #620: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #621: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #622: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #623: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #624: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:45 UTC 2011 ssl.sh: #625: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #626: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #627: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #628: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #629: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #630: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #631: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #632: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #633: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #634: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #635: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #636: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #637: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #638: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #639: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #640: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #641: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #642: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #643: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:46 UTC 2011 ssl.sh: #644: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #645: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #646: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #647: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #648: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #649: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #650: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #651: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #652: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #653: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #654: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #655: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #656: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #657: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #658: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #659: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 7744 >/dev/null 2>/dev/null selfserv_9519 with PID 7744 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #660: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7744 at Tue Nov 8 16:12:47 UTC 2011 kill -USR1 7744 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7744 killed at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:47 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:47 UTC 2011 selfserv_9519 with PID 9166 started at Tue Nov 8 16:12:47 UTC 2011 Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:47 UTC 2011 ssl.sh: #661: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #662: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #663: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #664: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #665: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #666: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #667: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #668: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #669: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #670: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #671: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #672: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #673: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #674: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #675: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #676: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #677: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #678: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #679: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:48 UTC 2011 ssl.sh: #680: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #681: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #682: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #683: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #684: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #685: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #686: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #687: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #688: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #689: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #690: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #691: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #692: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #693: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #694: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #695: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #696: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #697: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #698: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:49 UTC 2011 ssl.sh: #699: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #700: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9166 >/dev/null 2>/dev/null selfserv_9519 with PID 9166 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #701: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 9166 at Tue Nov 8 16:12:50 UTC 2011 kill -USR1 9166 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9166 killed at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:50 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 10593 >/dev/null 2>/dev/null selfserv_9519 with PID 10593 found at Tue Nov 8 16:12:50 UTC 2011 selfserv_9519 with PID 10593 started at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 10593 at Tue Nov 8 16:12:50 UTC 2011 kill -USR1 10593 ./ssl.sh: line 207: 10593 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 10593 killed at Tue Nov 8 16:12:50 UTC 2011 selfserv_9519 starting at Tue Nov 8 16:12:50 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 selfserv_9519 with PID 10635 started at Tue Nov 8 16:12:50 UTC 2011 Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #702: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #703: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #704: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #705: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #706: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #707: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #708: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #709: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #710: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #711: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #712: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #713: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ssl.sh: #714: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:50 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #715: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #716: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #717: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #718: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #719: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #720: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #721: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #722: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #723: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #724: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #725: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #726: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #727: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #728: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #729: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #730: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #731: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #732: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #733: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #734: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:51 UTC 2011 ssl.sh: #735: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #736: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #737: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #738: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #739: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #740: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #741: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 10635 >/dev/null 2>/dev/null selfserv_9519 with PID 10635 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #742: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 10635 at Tue Nov 8 16:12:52 UTC 2011 kill -USR1 10635 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 10635 killed at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 selfserv_9519 with PID 12055 started at Tue Nov 8 16:12:52 UTC 2011 Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #743: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #744: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #745: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #746: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #747: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #748: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #749: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #750: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:52 UTC 2011 ssl.sh: #751: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #752: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #753: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #754: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #755: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #756: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #757: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #758: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #759: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #760: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #761: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #762: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #763: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #764: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #765: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #766: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #767: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #768: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #769: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 109 bytes tstclnt: Writing 109 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #770: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:53 UTC 2011 ssl.sh: #771: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #772: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #773: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #774: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #775: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #776: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #777: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #778: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #779: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #780: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #781: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #782: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12055 >/dev/null 2>/dev/null selfserv_9519 with PID 12055 found at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: #783: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12055 at Tue Nov 8 16:12:54 UTC 2011 kill -USR1 12055 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12055 killed at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13480 >/dev/null 2>/dev/null selfserv_9519 with PID 13480 found at Tue Nov 8 16:12:54 UTC 2011 selfserv_9519 with PID 13480 started at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 13480 at Tue Nov 8 16:12:54 UTC 2011 kill -USR1 13480 ./ssl.sh: line 207: 13480 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13480 killed at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: SSL Cipher Coverage - server bypass/client normal =============================== selfserv_9519 starting at Tue Nov 8 16:12:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:54 UTC 2011 selfserv_9519 with PID 13528 started at Tue Nov 8 16:12:54 UTC 2011 ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c A -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c B \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c C \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c D -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c E \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c F -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #790: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #791: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #792: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #793: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #794: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #795: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #796: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #797: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #798: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #799: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #800: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #801: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #802: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #803: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #804: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #805: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #806: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #807: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #808: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #809: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #810: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 13528 >/dev/null 2>/dev/null selfserv_9519 with PID 13528 found at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 13528 at Tue Nov 8 16:12:56 UTC 2011 kill -USR1 13528 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13528 killed at Tue Nov 8 16:12:56 UTC 2011 ssl.sh: SSL Client Authentication - server bypass/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15110 >/dev/null 2>/dev/null selfserv_9519 with PID 15110 found at Tue Nov 8 16:12:56 UTC 2011 selfserv_9519 with PID 15110 started at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15110 at Tue Nov 8 16:12:56 UTC 2011 kill -USR1 15110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15110 killed at Tue Nov 8 16:12:56 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15167 >/dev/null 2>/dev/null selfserv_9519 with PID 15167 found at Tue Nov 8 16:12:56 UTC 2011 selfserv_9519 with PID 15167 started at Tue Nov 8 16:12:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15167 at Tue Nov 8 16:12:57 UTC 2011 kill -USR1 15167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15167 killed at Tue Nov 8 16:12:57 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15224 >/dev/null 2>/dev/null selfserv_9519 with PID 15224 found at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 with PID 15224 started at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15224 at Tue Nov 8 16:12:57 UTC 2011 kill -USR1 15224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15224 killed at Tue Nov 8 16:12:57 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15281 >/dev/null 2>/dev/null selfserv_9519 with PID 15281 found at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 with PID 15281 started at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #821: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15281 at Tue Nov 8 16:12:57 UTC 2011 kill -USR1 15281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15281 killed at Tue Nov 8 16:12:57 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15338 >/dev/null 2>/dev/null selfserv_9519 with PID 15338 found at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 with PID 15338 started at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #822: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15338 at Tue Nov 8 16:12:57 UTC 2011 kill -USR1 15338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15338 killed at Tue Nov 8 16:12:57 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15395 >/dev/null 2>/dev/null selfserv_9519 with PID 15395 found at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 with PID 15395 started at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15395 at Tue Nov 8 16:12:57 UTC 2011 kill -USR1 15395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15395 killed at Tue Nov 8 16:12:57 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15452 >/dev/null 2>/dev/null selfserv_9519 with PID 15452 found at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 with PID 15452 started at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15452 at Tue Nov 8 16:12:57 UTC 2011 kill -USR1 15452 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15452 killed at Tue Nov 8 16:12:57 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15509 >/dev/null 2>/dev/null selfserv_9519 with PID 15509 found at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 with PID 15509 started at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15509 at Tue Nov 8 16:12:57 UTC 2011 kill -USR1 15509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15509 killed at Tue Nov 8 16:12:57 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15566 >/dev/null 2>/dev/null selfserv_9519 with PID 15566 found at Tue Nov 8 16:12:57 UTC 2011 selfserv_9519 with PID 15566 started at Tue Nov 8 16:12:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15566 at Tue Nov 8 16:12:58 UTC 2011 kill -USR1 15566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15566 killed at Tue Nov 8 16:12:58 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15623 >/dev/null 2>/dev/null selfserv_9519 with PID 15623 found at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 with PID 15623 started at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #827: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15623 at Tue Nov 8 16:12:58 UTC 2011 kill -USR1 15623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15623 killed at Tue Nov 8 16:12:58 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15680 >/dev/null 2>/dev/null selfserv_9519 with PID 15680 found at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 with PID 15680 started at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #828: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15680 at Tue Nov 8 16:12:58 UTC 2011 kill -USR1 15680 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15680 killed at Tue Nov 8 16:12:58 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15737 >/dev/null 2>/dev/null selfserv_9519 with PID 15737 found at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 with PID 15737 started at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15737 at Tue Nov 8 16:12:58 UTC 2011 kill -USR1 15737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15737 killed at Tue Nov 8 16:12:58 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15794 >/dev/null 2>/dev/null selfserv_9519 with PID 15794 found at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 with PID 15794 started at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15794 at Tue Nov 8 16:12:58 UTC 2011 kill -USR1 15794 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15794 killed at Tue Nov 8 16:12:58 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15855 >/dev/null 2>/dev/null selfserv_9519 with PID 15855 found at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 with PID 15855 started at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15855 at Tue Nov 8 16:12:58 UTC 2011 kill -USR1 15855 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15855 killed at Tue Nov 8 16:12:58 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15912 >/dev/null 2>/dev/null selfserv_9519 with PID 15912 found at Tue Nov 8 16:12:58 UTC 2011 selfserv_9519 with PID 15912 started at Tue Nov 8 16:12:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15912 at Tue Nov 8 16:12:59 UTC 2011 kill -USR1 15912 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15912 killed at Tue Nov 8 16:12:59 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15969 >/dev/null 2>/dev/null selfserv_9519 with PID 15969 found at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 with PID 15969 started at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #833: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15969 at Tue Nov 8 16:12:59 UTC 2011 kill -USR1 15969 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15969 killed at Tue Nov 8 16:12:59 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16026 >/dev/null 2>/dev/null selfserv_9519 with PID 16026 found at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 with PID 16026 started at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #834: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16026 at Tue Nov 8 16:12:59 UTC 2011 kill -USR1 16026 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16026 killed at Tue Nov 8 16:12:59 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16083 >/dev/null 2>/dev/null selfserv_9519 with PID 16083 found at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 with PID 16083 started at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16083 at Tue Nov 8 16:12:59 UTC 2011 kill -USR1 16083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16083 killed at Tue Nov 8 16:12:59 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16140 >/dev/null 2>/dev/null selfserv_9519 with PID 16140 found at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 with PID 16140 started at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16140 at Tue Nov 8 16:12:59 UTC 2011 kill -USR1 16140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16140 killed at Tue Nov 8 16:12:59 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16197 >/dev/null 2>/dev/null selfserv_9519 with PID 16197 found at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 with PID 16197 started at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16197 at Tue Nov 8 16:12:59 UTC 2011 kill -USR1 16197 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16197 killed at Tue Nov 8 16:12:59 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16254 >/dev/null 2>/dev/null selfserv_9519 with PID 16254 found at Tue Nov 8 16:12:59 UTC 2011 selfserv_9519 with PID 16254 started at Tue Nov 8 16:12:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16254 at Tue Nov 8 16:13:00 UTC 2011 kill -USR1 16254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16254 killed at Tue Nov 8 16:13:00 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16311 >/dev/null 2>/dev/null selfserv_9519 with PID 16311 found at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 with PID 16311 started at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #839: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16311 at Tue Nov 8 16:13:00 UTC 2011 kill -USR1 16311 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16311 killed at Tue Nov 8 16:13:00 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16368 >/dev/null 2>/dev/null selfserv_9519 with PID 16368 found at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 with PID 16368 started at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #840: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16368 at Tue Nov 8 16:13:00 UTC 2011 kill -USR1 16368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16368 killed at Tue Nov 8 16:13:00 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16425 >/dev/null 2>/dev/null selfserv_9519 with PID 16425 found at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 with PID 16425 started at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16425 at Tue Nov 8 16:13:00 UTC 2011 kill -USR1 16425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16425 killed at Tue Nov 8 16:13:00 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16556 >/dev/null 2>/dev/null selfserv_9519 with PID 16556 found at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 with PID 16556 started at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16556 at Tue Nov 8 16:13:00 UTC 2011 kill -USR1 16556 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16556 killed at Tue Nov 8 16:13:00 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16619 >/dev/null 2>/dev/null selfserv_9519 with PID 16619 found at Tue Nov 8 16:13:00 UTC 2011 selfserv_9519 with PID 16619 started at Tue Nov 8 16:13:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16619 at Tue Nov 8 16:13:00 UTC 2011 kill -USR1 16619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16619 killed at Tue Nov 8 16:13:00 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16682 >/dev/null 2>/dev/null selfserv_9519 with PID 16682 found at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 with PID 16682 started at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16682 at Tue Nov 8 16:13:01 UTC 2011 kill -USR1 16682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16682 killed at Tue Nov 8 16:13:01 UTC 2011 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16745 >/dev/null 2>/dev/null selfserv_9519 with PID 16745 found at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 with PID 16745 started at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16745 at Tue Nov 8 16:13:01 UTC 2011 kill -USR1 16745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16745 killed at Tue Nov 8 16:13:01 UTC 2011 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9519 starting at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16808 >/dev/null 2>/dev/null selfserv_9519 with PID 16808 found at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 with PID 16808 started at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16808 at Tue Nov 8 16:13:01 UTC 2011 kill -USR1 16808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16808 killed at Tue Nov 8 16:13:01 UTC 2011 ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16871 >/dev/null 2>/dev/null selfserv_9519 with PID 16871 found at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 with PID 16871 started at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16871 at Tue Nov 8 16:13:01 UTC 2011 kill -USR1 16871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16871 killed at Tue Nov 8 16:13:01 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16934 >/dev/null 2>/dev/null selfserv_9519 with PID 16934 found at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 with PID 16934 started at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16934 at Tue Nov 8 16:13:01 UTC 2011 kill -USR1 16934 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16934 killed at Tue Nov 8 16:13:01 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16997 >/dev/null 2>/dev/null selfserv_9519 with PID 16997 found at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 with PID 16997 started at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16997 at Tue Nov 8 16:13:01 UTC 2011 kill -USR1 16997 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16997 killed at Tue Nov 8 16:13:01 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17060 >/dev/null 2>/dev/null selfserv_9519 with PID 17060 found at Tue Nov 8 16:13:01 UTC 2011 selfserv_9519 with PID 17060 started at Tue Nov 8 16:13:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 17060 at Tue Nov 8 16:13:02 UTC 2011 kill -USR1 17060 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17060 killed at Tue Nov 8 16:13:02 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:13:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17123 >/dev/null 2>/dev/null selfserv_9519 with PID 17123 found at Tue Nov 8 16:13:02 UTC 2011 selfserv_9519 with PID 17123 started at Tue Nov 8 16:13:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 17123 at Tue Nov 8 16:13:02 UTC 2011 kill -USR1 17123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17123 killed at Tue Nov 8 16:13:02 UTC 2011 ssl.sh: SSL Stress Test - server bypass/client normal =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17474 >/dev/null 2>/dev/null selfserv_9519 with PID 17474 found at Tue Nov 8 16:13:02 UTC 2011 selfserv_9519 with PID 17474 started at Tue Nov 8 16:13:02 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:02 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Tue Nov 8 16:13:02 UTC 2011 ssl.sh: #852: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17474 at Tue Nov 8 16:13:02 UTC 2011 kill -USR1 17474 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17474 killed at Tue Nov 8 16:13:02 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17550 >/dev/null 2>/dev/null selfserv_9519 with PID 17550 found at Tue Nov 8 16:13:02 UTC 2011 selfserv_9519 with PID 17550 started at Tue Nov 8 16:13:02 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:02 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:03 UTC 2011 ssl.sh: #853: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17550 at Tue Nov 8 16:13:03 UTC 2011 kill -USR1 17550 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17550 killed at Tue Nov 8 16:13:03 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:03 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17632 >/dev/null 2>/dev/null selfserv_9519 with PID 17632 found at Tue Nov 8 16:13:03 UTC 2011 selfserv_9519 with PID 17632 started at Tue Nov 8 16:13:03 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:03 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:03 UTC 2011 ssl.sh: #854: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17632 at Tue Nov 8 16:13:03 UTC 2011 kill -USR1 17632 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17632 killed at Tue Nov 8 16:13:03 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:03 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17708 >/dev/null 2>/dev/null selfserv_9519 with PID 17708 found at Tue Nov 8 16:13:03 UTC 2011 selfserv_9519 with PID 17708 started at Tue Nov 8 16:13:03 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:03 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:03 UTC 2011 ssl.sh: #855: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17708 at Tue Nov 8 16:13:03 UTC 2011 kill -USR1 17708 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17708 killed at Tue Nov 8 16:13:03 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:13:03 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17784 >/dev/null 2>/dev/null selfserv_9519 with PID 17784 found at Tue Nov 8 16:13:03 UTC 2011 selfserv_9519 with PID 17784 started at Tue Nov 8 16:13:03 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:03 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:04 UTC 2011 ssl.sh: #856: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17784 at Tue Nov 8 16:13:04 UTC 2011 kill -USR1 17784 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17784 killed at Tue Nov 8 16:13:04 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:13:04 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:04 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17860 >/dev/null 2>/dev/null selfserv_9519 with PID 17860 found at Tue Nov 8 16:13:04 UTC 2011 selfserv_9519 with PID 17860 started at Tue Nov 8 16:13:04 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:04 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:04 UTC 2011 ssl.sh: #857: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17860 at Tue Nov 8 16:13:04 UTC 2011 kill -USR1 17860 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17860 killed at Tue Nov 8 16:13:04 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:13:04 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:04 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17936 >/dev/null 2>/dev/null selfserv_9519 with PID 17936 found at Tue Nov 8 16:13:04 UTC 2011 selfserv_9519 with PID 17936 started at Tue Nov 8 16:13:04 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:04 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:05 UTC 2011 ssl.sh: #858: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17936 at Tue Nov 8 16:13:05 UTC 2011 kill -USR1 17936 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17936 killed at Tue Nov 8 16:13:05 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18012 >/dev/null 2>/dev/null selfserv_9519 with PID 18012 found at Tue Nov 8 16:13:05 UTC 2011 selfserv_9519 with PID 18012 started at Tue Nov 8 16:13:05 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:05 UTC 2011 ssl.sh: #859: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18012 at Tue Nov 8 16:13:05 UTC 2011 kill -USR1 18012 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18012 killed at Tue Nov 8 16:13:05 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9519 starting at Tue Nov 8 16:13:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18094 >/dev/null 2>/dev/null selfserv_9519 with PID 18094 found at Tue Nov 8 16:13:05 UTC 2011 selfserv_9519 with PID 18094 started at Tue Nov 8 16:13:05 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:05 UTC 2011 ssl.sh: #860: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18094 at Tue Nov 8 16:13:06 UTC 2011 kill -USR1 18094 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18094 killed at Tue Nov 8 16:13:06 UTC 2011 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:06 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18191 >/dev/null 2>/dev/null selfserv_9519 with PID 18191 found at Tue Nov 8 16:13:06 UTC 2011 selfserv_9519 with PID 18191 started at Tue Nov 8 16:13:06 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:06 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:06 UTC 2011 ssl.sh: #861: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18191 at Tue Nov 8 16:13:06 UTC 2011 kill -USR1 18191 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18191 killed at Tue Nov 8 16:13:06 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:06 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18266 >/dev/null 2>/dev/null selfserv_9519 with PID 18266 found at Tue Nov 8 16:13:06 UTC 2011 selfserv_9519 with PID 18266 started at Tue Nov 8 16:13:06 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:06 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:07 UTC 2011 ssl.sh: #862: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18266 at Tue Nov 8 16:13:07 UTC 2011 kill -USR1 18266 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18266 killed at Tue Nov 8 16:13:07 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:07 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18341 >/dev/null 2>/dev/null selfserv_9519 with PID 18341 found at Tue Nov 8 16:13:07 UTC 2011 selfserv_9519 with PID 18341 started at Tue Nov 8 16:13:07 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:07 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:07 UTC 2011 ssl.sh: #863: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18341 at Tue Nov 8 16:13:07 UTC 2011 kill -USR1 18341 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18341 killed at Tue Nov 8 16:13:07 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:07 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18416 >/dev/null 2>/dev/null selfserv_9519 with PID 18416 found at Tue Nov 8 16:13:07 UTC 2011 selfserv_9519 with PID 18416 started at Tue Nov 8 16:13:07 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:07 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:07 UTC 2011 ssl.sh: #864: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18416 at Tue Nov 8 16:13:07 UTC 2011 kill -USR1 18416 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18416 killed at Tue Nov 8 16:13:07 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:07 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18492 >/dev/null 2>/dev/null selfserv_9519 with PID 18492 found at Tue Nov 8 16:13:07 UTC 2011 selfserv_9519 with PID 18492 started at Tue Nov 8 16:13:07 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:07 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:07 UTC 2011 ssl.sh: #865: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18492 at Tue Nov 8 16:13:08 UTC 2011 kill -USR1 18492 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18492 killed at Tue Nov 8 16:13:08 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18568 >/dev/null 2>/dev/null selfserv_9519 with PID 18568 found at Tue Nov 8 16:13:08 UTC 2011 selfserv_9519 with PID 18568 started at Tue Nov 8 16:13:08 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:08 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:08 UTC 2011 ssl.sh: #866: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18568 at Tue Nov 8 16:13:08 UTC 2011 kill -USR1 18568 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18568 killed at Tue Nov 8 16:13:08 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18644 >/dev/null 2>/dev/null selfserv_9519 with PID 18644 found at Tue Nov 8 16:13:08 UTC 2011 selfserv_9519 with PID 18644 started at Tue Nov 8 16:13:08 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:08 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:08 UTC 2011 ssl.sh: #867: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18644 at Tue Nov 8 16:13:08 UTC 2011 kill -USR1 18644 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18644 killed at Tue Nov 8 16:13:08 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18720 >/dev/null 2>/dev/null selfserv_9519 with PID 18720 found at Tue Nov 8 16:13:08 UTC 2011 selfserv_9519 with PID 18720 started at Tue Nov 8 16:13:08 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:08 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:08 UTC 2011 ssl.sh: #868: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18720 at Tue Nov 8 16:13:08 UTC 2011 kill -USR1 18720 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18720 killed at Tue Nov 8 16:13:08 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9519 starting at Tue Nov 8 16:13:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18802 >/dev/null 2>/dev/null selfserv_9519 with PID 18802 found at Tue Nov 8 16:13:08 UTC 2011 selfserv_9519 with PID 18802 started at Tue Nov 8 16:13:08 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:08 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:09 UTC 2011 ssl.sh: #869: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18802 at Tue Nov 8 16:13:09 UTC 2011 kill -USR1 18802 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18802 killed at Tue Nov 8 16:13:09 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9519 starting at Tue Nov 8 16:13:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18888 >/dev/null 2>/dev/null selfserv_9519 with PID 18888 found at Tue Nov 8 16:13:09 UTC 2011 selfserv_9519 with PID 18888 started at Tue Nov 8 16:13:09 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:09 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:09 UTC 2011 ssl.sh: #870: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18888 at Tue Nov 8 16:13:09 UTC 2011 kill -USR1 18888 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18888 killed at Tue Nov 8 16:13:09 UTC 2011 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal =============================== selfserv_9519 starting at Tue Nov 8 16:13:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:09 UTC 2011 selfserv_9519 with PID 19043 started at Tue Nov 8 16:13:09 UTC 2011 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 19043 >/dev/null 2>/dev/null selfserv_9519 with PID 19043 found at Tue Nov 8 16:13:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 19043 at Tue Nov 8 16:13:10 UTC 2011 kill -USR1 19043 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19043 killed at Tue Nov 8 16:13:10 UTC 2011 ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20514 >/dev/null 2>/dev/null selfserv_9519 with PID 20514 found at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 with PID 20514 started at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20514 at Tue Nov 8 16:13:11 UTC 2011 kill -USR1 20514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20514 killed at Tue Nov 8 16:13:11 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20571 >/dev/null 2>/dev/null selfserv_9519 with PID 20571 found at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 with PID 20571 started at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20571 at Tue Nov 8 16:13:11 UTC 2011 kill -USR1 20571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20571 killed at Tue Nov 8 16:13:11 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20628 >/dev/null 2>/dev/null selfserv_9519 with PID 20628 found at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 with PID 20628 started at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20628 at Tue Nov 8 16:13:11 UTC 2011 kill -USR1 20628 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20628 killed at Tue Nov 8 16:13:11 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20685 >/dev/null 2>/dev/null selfserv_9519 with PID 20685 found at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 with PID 20685 started at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #902: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 20685 at Tue Nov 8 16:13:11 UTC 2011 kill -USR1 20685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20685 killed at Tue Nov 8 16:13:11 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20742 >/dev/null 2>/dev/null selfserv_9519 with PID 20742 found at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 with PID 20742 started at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #903: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 20742 at Tue Nov 8 16:13:11 UTC 2011 kill -USR1 20742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20742 killed at Tue Nov 8 16:13:11 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20799 >/dev/null 2>/dev/null selfserv_9519 with PID 20799 found at Tue Nov 8 16:13:11 UTC 2011 selfserv_9519 with PID 20799 started at Tue Nov 8 16:13:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20799 at Tue Nov 8 16:13:12 UTC 2011 kill -USR1 20799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20799 killed at Tue Nov 8 16:13:12 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20856 >/dev/null 2>/dev/null selfserv_9519 with PID 20856 found at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 with PID 20856 started at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20856 at Tue Nov 8 16:13:12 UTC 2011 kill -USR1 20856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20856 killed at Tue Nov 8 16:13:12 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20913 >/dev/null 2>/dev/null selfserv_9519 with PID 20913 found at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 with PID 20913 started at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20913 at Tue Nov 8 16:13:12 UTC 2011 kill -USR1 20913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20913 killed at Tue Nov 8 16:13:12 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20970 >/dev/null 2>/dev/null selfserv_9519 with PID 20970 found at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 with PID 20970 started at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20970 at Tue Nov 8 16:13:12 UTC 2011 kill -USR1 20970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20970 killed at Tue Nov 8 16:13:12 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21027 >/dev/null 2>/dev/null selfserv_9519 with PID 21027 found at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 with PID 21027 started at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #908: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21027 at Tue Nov 8 16:13:12 UTC 2011 kill -USR1 21027 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21027 killed at Tue Nov 8 16:13:12 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21084 >/dev/null 2>/dev/null selfserv_9519 with PID 21084 found at Tue Nov 8 16:13:12 UTC 2011 selfserv_9519 with PID 21084 started at Tue Nov 8 16:13:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #909: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21084 at Tue Nov 8 16:13:12 UTC 2011 kill -USR1 21084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21084 killed at Tue Nov 8 16:13:12 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21141 >/dev/null 2>/dev/null selfserv_9519 with PID 21141 found at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 with PID 21141 started at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21141 at Tue Nov 8 16:13:13 UTC 2011 kill -USR1 21141 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21141 killed at Tue Nov 8 16:13:13 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21198 >/dev/null 2>/dev/null selfserv_9519 with PID 21198 found at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 with PID 21198 started at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21198 at Tue Nov 8 16:13:13 UTC 2011 kill -USR1 21198 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21198 killed at Tue Nov 8 16:13:13 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21255 >/dev/null 2>/dev/null selfserv_9519 with PID 21255 found at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 with PID 21255 started at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21255 at Tue Nov 8 16:13:13 UTC 2011 kill -USR1 21255 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21255 killed at Tue Nov 8 16:13:13 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21312 >/dev/null 2>/dev/null selfserv_9519 with PID 21312 found at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 with PID 21312 started at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21312 at Tue Nov 8 16:13:13 UTC 2011 kill -USR1 21312 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21312 killed at Tue Nov 8 16:13:13 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21369 >/dev/null 2>/dev/null selfserv_9519 with PID 21369 found at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 with PID 21369 started at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #914: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21369 at Tue Nov 8 16:13:13 UTC 2011 kill -USR1 21369 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21369 killed at Tue Nov 8 16:13:13 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21426 >/dev/null 2>/dev/null selfserv_9519 with PID 21426 found at Tue Nov 8 16:13:13 UTC 2011 selfserv_9519 with PID 21426 started at Tue Nov 8 16:13:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #915: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21426 at Tue Nov 8 16:13:13 UTC 2011 kill -USR1 21426 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21426 killed at Tue Nov 8 16:13:13 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21483 >/dev/null 2>/dev/null selfserv_9519 with PID 21483 found at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 with PID 21483 started at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21483 at Tue Nov 8 16:13:14 UTC 2011 kill -USR1 21483 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21483 killed at Tue Nov 8 16:13:14 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21540 >/dev/null 2>/dev/null selfserv_9519 with PID 21540 found at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 with PID 21540 started at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21540 at Tue Nov 8 16:13:14 UTC 2011 kill -USR1 21540 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21540 killed at Tue Nov 8 16:13:14 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21597 >/dev/null 2>/dev/null selfserv_9519 with PID 21597 found at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 with PID 21597 started at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21597 at Tue Nov 8 16:13:14 UTC 2011 kill -USR1 21597 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21597 killed at Tue Nov 8 16:13:14 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21654 >/dev/null 2>/dev/null selfserv_9519 with PID 21654 found at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 with PID 21654 started at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21654 at Tue Nov 8 16:13:14 UTC 2011 kill -USR1 21654 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21654 killed at Tue Nov 8 16:13:14 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21711 >/dev/null 2>/dev/null selfserv_9519 with PID 21711 found at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 with PID 21711 started at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #920: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21711 at Tue Nov 8 16:13:14 UTC 2011 kill -USR1 21711 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21711 killed at Tue Nov 8 16:13:14 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21768 >/dev/null 2>/dev/null selfserv_9519 with PID 21768 found at Tue Nov 8 16:13:14 UTC 2011 selfserv_9519 with PID 21768 started at Tue Nov 8 16:13:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #921: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21768 at Tue Nov 8 16:13:15 UTC 2011 kill -USR1 21768 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21768 killed at Tue Nov 8 16:13:15 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21825 >/dev/null 2>/dev/null selfserv_9519 with PID 21825 found at Tue Nov 8 16:13:15 UTC 2011 selfserv_9519 with PID 21825 started at Tue Nov 8 16:13:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21825 at Tue Nov 8 16:13:15 UTC 2011 kill -USR1 21825 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21825 killed at Tue Nov 8 16:13:15 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client normal =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22260 >/dev/null 2>/dev/null selfserv_9519 with PID 22260 found at Tue Nov 8 16:13:15 UTC 2011 selfserv_9519 with PID 22260 started at Tue Nov 8 16:13:15 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:15 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:15 UTC 2011 ssl.sh: #923: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22260 at Tue Nov 8 16:13:15 UTC 2011 kill -USR1 22260 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22260 killed at Tue Nov 8 16:13:15 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22336 >/dev/null 2>/dev/null selfserv_9519 with PID 22336 found at Tue Nov 8 16:13:15 UTC 2011 selfserv_9519 with PID 22336 started at Tue Nov 8 16:13:15 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:15 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:16 UTC 2011 ssl.sh: #924: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22336 at Tue Nov 8 16:13:16 UTC 2011 kill -USR1 22336 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22336 killed at Tue Nov 8 16:13:16 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22412 >/dev/null 2>/dev/null selfserv_9519 with PID 22412 found at Tue Nov 8 16:13:16 UTC 2011 selfserv_9519 with PID 22412 started at Tue Nov 8 16:13:16 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:16 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:16 UTC 2011 ssl.sh: #925: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22412 at Tue Nov 8 16:13:16 UTC 2011 kill -USR1 22412 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22412 killed at Tue Nov 8 16:13:16 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:13:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22488 >/dev/null 2>/dev/null selfserv_9519 with PID 22488 found at Tue Nov 8 16:13:16 UTC 2011 selfserv_9519 with PID 22488 started at Tue Nov 8 16:13:16 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:16 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:16 UTC 2011 ssl.sh: #926: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22488 at Tue Nov 8 16:13:16 UTC 2011 kill -USR1 22488 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22488 killed at Tue Nov 8 16:13:16 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:13:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22564 >/dev/null 2>/dev/null selfserv_9519 with PID 22564 found at Tue Nov 8 16:13:16 UTC 2011 selfserv_9519 with PID 22564 started at Tue Nov 8 16:13:16 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:16 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:17 UTC 2011 ssl.sh: #927: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22564 at Tue Nov 8 16:13:17 UTC 2011 kill -USR1 22564 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22564 killed at Tue Nov 8 16:13:17 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:13:17 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22640 >/dev/null 2>/dev/null selfserv_9519 with PID 22640 found at Tue Nov 8 16:13:17 UTC 2011 selfserv_9519 with PID 22640 started at Tue Nov 8 16:13:17 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:17 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:17 UTC 2011 ssl.sh: #928: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22640 at Tue Nov 8 16:13:17 UTC 2011 kill -USR1 22640 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22640 killed at Tue Nov 8 16:13:17 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:17 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22716 >/dev/null 2>/dev/null selfserv_9519 with PID 22716 found at Tue Nov 8 16:13:17 UTC 2011 selfserv_9519 with PID 22716 started at Tue Nov 8 16:13:17 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:17 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:18 UTC 2011 ssl.sh: #929: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22716 at Tue Nov 8 16:13:18 UTC 2011 kill -USR1 22716 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22716 killed at Tue Nov 8 16:13:18 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:18 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22821 >/dev/null 2>/dev/null selfserv_9519 with PID 22821 found at Tue Nov 8 16:13:18 UTC 2011 selfserv_9519 with PID 22821 started at Tue Nov 8 16:13:18 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:18 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:18 UTC 2011 ssl.sh: #930: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22821 at Tue Nov 8 16:13:18 UTC 2011 kill -USR1 22821 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22821 killed at Tue Nov 8 16:13:18 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:18 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22900 >/dev/null 2>/dev/null selfserv_9519 with PID 22900 found at Tue Nov 8 16:13:18 UTC 2011 selfserv_9519 with PID 22900 started at Tue Nov 8 16:13:18 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:18 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:19 UTC 2011 ssl.sh: #931: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22900 at Tue Nov 8 16:13:19 UTC 2011 kill -USR1 22900 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22900 killed at Tue Nov 8 16:13:19 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:19 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22975 >/dev/null 2>/dev/null selfserv_9519 with PID 22975 found at Tue Nov 8 16:13:19 UTC 2011 selfserv_9519 with PID 22975 started at Tue Nov 8 16:13:19 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:19 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:19 UTC 2011 ssl.sh: #932: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22975 at Tue Nov 8 16:13:19 UTC 2011 kill -USR1 22975 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22975 killed at Tue Nov 8 16:13:19 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:19 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23051 >/dev/null 2>/dev/null selfserv_9519 with PID 23051 found at Tue Nov 8 16:13:19 UTC 2011 selfserv_9519 with PID 23051 started at Tue Nov 8 16:13:19 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:19 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:19 UTC 2011 ssl.sh: #933: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 23051 at Tue Nov 8 16:13:19 UTC 2011 kill -USR1 23051 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23051 killed at Tue Nov 8 16:13:19 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:19 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23127 >/dev/null 2>/dev/null selfserv_9519 with PID 23127 found at Tue Nov 8 16:13:19 UTC 2011 selfserv_9519 with PID 23127 started at Tue Nov 8 16:13:19 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:19 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:19 UTC 2011 ssl.sh: #934: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 23127 at Tue Nov 8 16:13:19 UTC 2011 kill -USR1 23127 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23127 killed at Tue Nov 8 16:13:19 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23203 >/dev/null 2>/dev/null selfserv_9519 with PID 23203 found at Tue Nov 8 16:13:20 UTC 2011 selfserv_9519 with PID 23203 started at Tue Nov 8 16:13:20 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:20 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:20 UTC 2011 ssl.sh: #935: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 23203 at Tue Nov 8 16:13:20 UTC 2011 kill -USR1 23203 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23203 killed at Tue Nov 8 16:13:20 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23279 >/dev/null 2>/dev/null selfserv_9519 with PID 23279 found at Tue Nov 8 16:13:20 UTC 2011 selfserv_9519 with PID 23279 started at Tue Nov 8 16:13:20 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:20 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:20 UTC 2011 ssl.sh: #936: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 23279 at Tue Nov 8 16:13:20 UTC 2011 kill -USR1 23279 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23279 killed at Tue Nov 8 16:13:20 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage - server normal/client bypass =============================== selfserv_9519 starting at Tue Nov 8 16:13:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:20 UTC 2011 selfserv_9519 with PID 23446 started at Tue Nov 8 16:13:20 UTC 2011 ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c A -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c B -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c C -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c D -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c E -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c F -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #944: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #945: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #946: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #947: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #948: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #949: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #950: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #951: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #952: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #953: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #954: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #955: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #956: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #957: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #958: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #959: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #960: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #961: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #962: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 23446 >/dev/null 2>/dev/null selfserv_9519 with PID 23446 found at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 23446 at Tue Nov 8 16:13:22 UTC 2011 kill -USR1 23446 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23446 killed at Tue Nov 8 16:13:22 UTC 2011 ssl.sh: SSL Client Authentication - server normal/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:22 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25032 >/dev/null 2>/dev/null selfserv_9519 with PID 25032 found at Tue Nov 8 16:13:22 UTC 2011 selfserv_9519 with PID 25032 started at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25032 at Tue Nov 8 16:13:22 UTC 2011 kill -USR1 25032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25032 killed at Tue Nov 8 16:13:22 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:22 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25089 >/dev/null 2>/dev/null selfserv_9519 with PID 25089 found at Tue Nov 8 16:13:22 UTC 2011 selfserv_9519 with PID 25089 started at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25089 at Tue Nov 8 16:13:22 UTC 2011 kill -USR1 25089 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25089 killed at Tue Nov 8 16:13:22 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:22 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25146 >/dev/null 2>/dev/null selfserv_9519 with PID 25146 found at Tue Nov 8 16:13:22 UTC 2011 selfserv_9519 with PID 25146 started at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25146 at Tue Nov 8 16:13:22 UTC 2011 kill -USR1 25146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25146 killed at Tue Nov 8 16:13:22 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:22 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25203 >/dev/null 2>/dev/null selfserv_9519 with PID 25203 found at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 with PID 25203 started at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #974: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25203 at Tue Nov 8 16:13:23 UTC 2011 kill -USR1 25203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25203 killed at Tue Nov 8 16:13:23 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25260 >/dev/null 2>/dev/null selfserv_9519 with PID 25260 found at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 with PID 25260 started at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #975: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25260 at Tue Nov 8 16:13:23 UTC 2011 kill -USR1 25260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25260 killed at Tue Nov 8 16:13:23 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25317 >/dev/null 2>/dev/null selfserv_9519 with PID 25317 found at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 with PID 25317 started at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25317 at Tue Nov 8 16:13:23 UTC 2011 kill -USR1 25317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25317 killed at Tue Nov 8 16:13:23 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25374 >/dev/null 2>/dev/null selfserv_9519 with PID 25374 found at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 with PID 25374 started at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25374 at Tue Nov 8 16:13:23 UTC 2011 kill -USR1 25374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25374 killed at Tue Nov 8 16:13:23 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25431 >/dev/null 2>/dev/null selfserv_9519 with PID 25431 found at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 with PID 25431 started at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25431 at Tue Nov 8 16:13:23 UTC 2011 kill -USR1 25431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25431 killed at Tue Nov 8 16:13:23 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25488 >/dev/null 2>/dev/null selfserv_9519 with PID 25488 found at Tue Nov 8 16:13:23 UTC 2011 selfserv_9519 with PID 25488 started at Tue Nov 8 16:13:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25488 at Tue Nov 8 16:13:24 UTC 2011 kill -USR1 25488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25488 killed at Tue Nov 8 16:13:24 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25545 >/dev/null 2>/dev/null selfserv_9519 with PID 25545 found at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 with PID 25545 started at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #980: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25545 at Tue Nov 8 16:13:24 UTC 2011 kill -USR1 25545 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25545 killed at Tue Nov 8 16:13:24 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25602 >/dev/null 2>/dev/null selfserv_9519 with PID 25602 found at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 with PID 25602 started at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #981: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25602 at Tue Nov 8 16:13:24 UTC 2011 kill -USR1 25602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25602 killed at Tue Nov 8 16:13:24 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25659 >/dev/null 2>/dev/null selfserv_9519 with PID 25659 found at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 with PID 25659 started at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25659 at Tue Nov 8 16:13:24 UTC 2011 kill -USR1 25659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25659 killed at Tue Nov 8 16:13:24 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25716 >/dev/null 2>/dev/null selfserv_9519 with PID 25716 found at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 with PID 25716 started at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25716 at Tue Nov 8 16:13:24 UTC 2011 kill -USR1 25716 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25716 killed at Tue Nov 8 16:13:24 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25773 >/dev/null 2>/dev/null selfserv_9519 with PID 25773 found at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 with PID 25773 started at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25773 at Tue Nov 8 16:13:24 UTC 2011 kill -USR1 25773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25773 killed at Tue Nov 8 16:13:24 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25830 >/dev/null 2>/dev/null selfserv_9519 with PID 25830 found at Tue Nov 8 16:13:24 UTC 2011 selfserv_9519 with PID 25830 started at Tue Nov 8 16:13:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25830 at Tue Nov 8 16:13:25 UTC 2011 kill -USR1 25830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25830 killed at Tue Nov 8 16:13:25 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25887 >/dev/null 2>/dev/null selfserv_9519 with PID 25887 found at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 with PID 25887 started at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #986: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25887 at Tue Nov 8 16:13:25 UTC 2011 kill -USR1 25887 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25887 killed at Tue Nov 8 16:13:25 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25944 >/dev/null 2>/dev/null selfserv_9519 with PID 25944 found at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 with PID 25944 started at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #987: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25944 at Tue Nov 8 16:13:25 UTC 2011 kill -USR1 25944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25944 killed at Tue Nov 8 16:13:25 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26001 >/dev/null 2>/dev/null selfserv_9519 with PID 26001 found at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 with PID 26001 started at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26001 at Tue Nov 8 16:13:25 UTC 2011 kill -USR1 26001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26001 killed at Tue Nov 8 16:13:25 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26059 >/dev/null 2>/dev/null selfserv_9519 with PID 26059 found at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 with PID 26059 started at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26059 at Tue Nov 8 16:13:25 UTC 2011 kill -USR1 26059 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26059 killed at Tue Nov 8 16:13:25 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26116 >/dev/null 2>/dev/null selfserv_9519 with PID 26116 found at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 with PID 26116 started at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26116 at Tue Nov 8 16:13:25 UTC 2011 kill -USR1 26116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26116 killed at Tue Nov 8 16:13:25 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26173 >/dev/null 2>/dev/null selfserv_9519 with PID 26173 found at Tue Nov 8 16:13:25 UTC 2011 selfserv_9519 with PID 26173 started at Tue Nov 8 16:13:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26173 at Tue Nov 8 16:13:26 UTC 2011 kill -USR1 26173 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26173 killed at Tue Nov 8 16:13:26 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26230 >/dev/null 2>/dev/null selfserv_9519 with PID 26230 found at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 with PID 26230 started at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #992: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 26230 at Tue Nov 8 16:13:26 UTC 2011 kill -USR1 26230 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26230 killed at Tue Nov 8 16:13:26 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26287 >/dev/null 2>/dev/null selfserv_9519 with PID 26287 found at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 with PID 26287 started at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #993: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 26287 at Tue Nov 8 16:13:26 UTC 2011 kill -USR1 26287 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26287 killed at Tue Nov 8 16:13:26 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26344 >/dev/null 2>/dev/null selfserv_9519 with PID 26344 found at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 with PID 26344 started at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26344 at Tue Nov 8 16:13:26 UTC 2011 kill -USR1 26344 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26344 killed at Tue Nov 8 16:13:26 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26469 >/dev/null 2>/dev/null selfserv_9519 with PID 26469 found at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 with PID 26469 started at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26469 at Tue Nov 8 16:13:26 UTC 2011 kill -USR1 26469 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26469 killed at Tue Nov 8 16:13:26 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26532 >/dev/null 2>/dev/null selfserv_9519 with PID 26532 found at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 with PID 26532 started at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26532 at Tue Nov 8 16:13:26 UTC 2011 kill -USR1 26532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26532 killed at Tue Nov 8 16:13:26 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26595 >/dev/null 2>/dev/null selfserv_9519 with PID 26595 found at Tue Nov 8 16:13:26 UTC 2011 selfserv_9519 with PID 26595 started at Tue Nov 8 16:13:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #997: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 26595 at Tue Nov 8 16:13:27 UTC 2011 kill -USR1 26595 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26595 killed at Tue Nov 8 16:13:27 UTC 2011 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26658 >/dev/null 2>/dev/null selfserv_9519 with PID 26658 found at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 with PID 26658 started at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26658 at Tue Nov 8 16:13:27 UTC 2011 kill -USR1 26658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26658 killed at Tue Nov 8 16:13:27 UTC 2011 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9519 starting at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26721 >/dev/null 2>/dev/null selfserv_9519 with PID 26721 found at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 with PID 26721 started at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #999: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 26721 at Tue Nov 8 16:13:27 UTC 2011 kill -USR1 26721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26721 killed at Tue Nov 8 16:13:27 UTC 2011 ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26784 >/dev/null 2>/dev/null selfserv_9519 with PID 26784 found at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 with PID 26784 started at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26784 at Tue Nov 8 16:13:27 UTC 2011 kill -USR1 26784 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26784 killed at Tue Nov 8 16:13:27 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26847 >/dev/null 2>/dev/null selfserv_9519 with PID 26847 found at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 with PID 26847 started at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26847 at Tue Nov 8 16:13:27 UTC 2011 kill -USR1 26847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26847 killed at Tue Nov 8 16:13:27 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26910 >/dev/null 2>/dev/null selfserv_9519 with PID 26910 found at Tue Nov 8 16:13:27 UTC 2011 selfserv_9519 with PID 26910 started at Tue Nov 8 16:13:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1002: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 26910 at Tue Nov 8 16:13:28 UTC 2011 kill -USR1 26910 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26910 killed at Tue Nov 8 16:13:28 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:13:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26973 >/dev/null 2>/dev/null selfserv_9519 with PID 26973 found at Tue Nov 8 16:13:28 UTC 2011 selfserv_9519 with PID 26973 started at Tue Nov 8 16:13:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1003: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 26973 at Tue Nov 8 16:13:28 UTC 2011 kill -USR1 26973 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26973 killed at Tue Nov 8 16:13:28 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:13:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27036 >/dev/null 2>/dev/null selfserv_9519 with PID 27036 found at Tue Nov 8 16:13:28 UTC 2011 selfserv_9519 with PID 27036 started at Tue Nov 8 16:13:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1004: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 27036 at Tue Nov 8 16:13:28 UTC 2011 kill -USR1 27036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27036 killed at Tue Nov 8 16:13:28 UTC 2011 ssl.sh: SSL Stress Test - server normal/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27385 >/dev/null 2>/dev/null selfserv_9519 with PID 27385 found at Tue Nov 8 16:13:28 UTC 2011 selfserv_9519 with PID 27385 started at Tue Nov 8 16:13:28 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:28 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Tue Nov 8 16:13:28 UTC 2011 ssl.sh: #1005: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27385 at Tue Nov 8 16:13:28 UTC 2011 kill -USR1 27385 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27385 killed at Tue Nov 8 16:13:28 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27465 >/dev/null 2>/dev/null selfserv_9519 with PID 27465 found at Tue Nov 8 16:13:28 UTC 2011 selfserv_9519 with PID 27465 started at Tue Nov 8 16:13:28 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:28 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:29 UTC 2011 ssl.sh: #1006: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27465 at Tue Nov 8 16:13:29 UTC 2011 kill -USR1 27465 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27465 killed at Tue Nov 8 16:13:29 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27541 >/dev/null 2>/dev/null selfserv_9519 with PID 27541 found at Tue Nov 8 16:13:29 UTC 2011 selfserv_9519 with PID 27541 started at Tue Nov 8 16:13:29 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:29 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:29 UTC 2011 ssl.sh: #1007: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27541 at Tue Nov 8 16:13:29 UTC 2011 kill -USR1 27541 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27541 killed at Tue Nov 8 16:13:29 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27617 >/dev/null 2>/dev/null selfserv_9519 with PID 27617 found at Tue Nov 8 16:13:29 UTC 2011 selfserv_9519 with PID 27617 started at Tue Nov 8 16:13:29 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:29 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:30 UTC 2011 ssl.sh: #1008: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27617 at Tue Nov 8 16:13:30 UTC 2011 kill -USR1 27617 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27617 killed at Tue Nov 8 16:13:30 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:13:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27693 >/dev/null 2>/dev/null selfserv_9519 with PID 27693 found at Tue Nov 8 16:13:30 UTC 2011 selfserv_9519 with PID 27693 started at Tue Nov 8 16:13:30 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:30 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:30 UTC 2011 ssl.sh: #1009: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27693 at Tue Nov 8 16:13:30 UTC 2011 kill -USR1 27693 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27693 killed at Tue Nov 8 16:13:30 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:13:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27769 >/dev/null 2>/dev/null selfserv_9519 with PID 27769 found at Tue Nov 8 16:13:30 UTC 2011 selfserv_9519 with PID 27769 started at Tue Nov 8 16:13:30 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:30 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:30 UTC 2011 ssl.sh: #1010: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27769 at Tue Nov 8 16:13:30 UTC 2011 kill -USR1 27769 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27769 killed at Tue Nov 8 16:13:30 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:13:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27845 >/dev/null 2>/dev/null selfserv_9519 with PID 27845 found at Tue Nov 8 16:13:30 UTC 2011 selfserv_9519 with PID 27845 started at Tue Nov 8 16:13:30 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:30 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:31 UTC 2011 ssl.sh: #1011: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27845 at Tue Nov 8 16:13:31 UTC 2011 kill -USR1 27845 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27845 killed at Tue Nov 8 16:13:31 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27921 >/dev/null 2>/dev/null selfserv_9519 with PID 27921 found at Tue Nov 8 16:13:31 UTC 2011 selfserv_9519 with PID 27921 started at Tue Nov 8 16:13:31 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:31 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:31 UTC 2011 ssl.sh: #1012: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27921 at Tue Nov 8 16:13:31 UTC 2011 kill -USR1 27921 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27921 killed at Tue Nov 8 16:13:31 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9519 starting at Tue Nov 8 16:13:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28003 >/dev/null 2>/dev/null selfserv_9519 with PID 28003 found at Tue Nov 8 16:13:31 UTC 2011 selfserv_9519 with PID 28003 started at Tue Nov 8 16:13:31 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:31 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:32 UTC 2011 ssl.sh: #1013: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28003 at Tue Nov 8 16:13:32 UTC 2011 kill -USR1 28003 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28003 killed at Tue Nov 8 16:13:32 UTC 2011 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28100 >/dev/null 2>/dev/null selfserv_9519 with PID 28100 found at Tue Nov 8 16:13:32 UTC 2011 selfserv_9519 with PID 28100 started at Tue Nov 8 16:13:32 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:32 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:32 UTC 2011 ssl.sh: #1014: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28100 at Tue Nov 8 16:13:32 UTC 2011 kill -USR1 28100 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28100 killed at Tue Nov 8 16:13:32 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28187 >/dev/null 2>/dev/null selfserv_9519 with PID 28187 found at Tue Nov 8 16:13:32 UTC 2011 selfserv_9519 with PID 28187 started at Tue Nov 8 16:13:32 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:33 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:33 UTC 2011 ssl.sh: #1015: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28187 at Tue Nov 8 16:13:33 UTC 2011 kill -USR1 28187 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28187 killed at Tue Nov 8 16:13:33 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28262 >/dev/null 2>/dev/null selfserv_9519 with PID 28262 found at Tue Nov 8 16:13:33 UTC 2011 selfserv_9519 with PID 28262 started at Tue Nov 8 16:13:33 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:33 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:33 UTC 2011 ssl.sh: #1016: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28262 at Tue Nov 8 16:13:33 UTC 2011 kill -USR1 28262 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28262 killed at Tue Nov 8 16:13:33 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28337 >/dev/null 2>/dev/null selfserv_9519 with PID 28337 found at Tue Nov 8 16:13:33 UTC 2011 selfserv_9519 with PID 28337 started at Tue Nov 8 16:13:33 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:33 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:33 UTC 2011 ssl.sh: #1017: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28337 at Tue Nov 8 16:13:33 UTC 2011 kill -USR1 28337 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28337 killed at Tue Nov 8 16:13:33 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28413 >/dev/null 2>/dev/null selfserv_9519 with PID 28413 found at Tue Nov 8 16:13:34 UTC 2011 selfserv_9519 with PID 28413 started at Tue Nov 8 16:13:34 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:34 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:34 UTC 2011 ssl.sh: #1018: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28413 at Tue Nov 8 16:13:34 UTC 2011 kill -USR1 28413 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28413 killed at Tue Nov 8 16:13:34 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28489 >/dev/null 2>/dev/null selfserv_9519 with PID 28489 found at Tue Nov 8 16:13:34 UTC 2011 selfserv_9519 with PID 28489 started at Tue Nov 8 16:13:34 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:34 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:34 UTC 2011 ssl.sh: #1019: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28489 at Tue Nov 8 16:13:34 UTC 2011 kill -USR1 28489 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28489 killed at Tue Nov 8 16:13:34 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28565 >/dev/null 2>/dev/null selfserv_9519 with PID 28565 found at Tue Nov 8 16:13:34 UTC 2011 selfserv_9519 with PID 28565 started at Tue Nov 8 16:13:34 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:34 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:34 UTC 2011 ssl.sh: #1020: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28565 at Tue Nov 8 16:13:34 UTC 2011 kill -USR1 28565 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28565 killed at Tue Nov 8 16:13:34 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28641 >/dev/null 2>/dev/null selfserv_9519 with PID 28641 found at Tue Nov 8 16:13:34 UTC 2011 selfserv_9519 with PID 28641 started at Tue Nov 8 16:13:34 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:34 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:34 UTC 2011 ssl.sh: #1021: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28641 at Tue Nov 8 16:13:34 UTC 2011 kill -USR1 28641 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28641 killed at Tue Nov 8 16:13:34 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9519 starting at Tue Nov 8 16:13:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28723 >/dev/null 2>/dev/null selfserv_9519 with PID 28723 found at Tue Nov 8 16:13:34 UTC 2011 selfserv_9519 with PID 28723 started at Tue Nov 8 16:13:34 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:34 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:35 UTC 2011 ssl.sh: #1022: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28723 at Tue Nov 8 16:13:35 UTC 2011 kill -USR1 28723 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28723 killed at Tue Nov 8 16:13:35 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9519 starting at Tue Nov 8 16:13:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28806 >/dev/null 2>/dev/null selfserv_9519 with PID 28806 found at Tue Nov 8 16:13:35 UTC 2011 selfserv_9519 with PID 28806 started at Tue Nov 8 16:13:35 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:35 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:35 UTC 2011 ssl.sh: #1023: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28806 at Tue Nov 8 16:13:35 UTC 2011 kill -USR1 28806 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28806 killed at Tue Nov 8 16:13:35 UTC 2011 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass =============================== selfserv_9519 starting at Tue Nov 8 16:13:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:35 UTC 2011 selfserv_9519 with PID 28959 started at Tue Nov 8 16:13:35 UTC 2011 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 28959 >/dev/null 2>/dev/null selfserv_9519 with PID 28959 found at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 28959 at Tue Nov 8 16:13:37 UTC 2011 kill -USR1 28959 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28959 killed at Tue Nov 8 16:13:37 UTC 2011 ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30427 >/dev/null 2>/dev/null selfserv_9519 with PID 30427 found at Tue Nov 8 16:13:37 UTC 2011 selfserv_9519 with PID 30427 started at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 30427 at Tue Nov 8 16:13:37 UTC 2011 kill -USR1 30427 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30427 killed at Tue Nov 8 16:13:37 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30484 >/dev/null 2>/dev/null selfserv_9519 with PID 30484 found at Tue Nov 8 16:13:37 UTC 2011 selfserv_9519 with PID 30484 started at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 30484 at Tue Nov 8 16:13:37 UTC 2011 kill -USR1 30484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30484 killed at Tue Nov 8 16:13:37 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30541 >/dev/null 2>/dev/null selfserv_9519 with PID 30541 found at Tue Nov 8 16:13:37 UTC 2011 selfserv_9519 with PID 30541 started at Tue Nov 8 16:13:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 30541 at Tue Nov 8 16:13:37 UTC 2011 kill -USR1 30541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30541 killed at Tue Nov 8 16:13:38 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30598 >/dev/null 2>/dev/null selfserv_9519 with PID 30598 found at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 with PID 30598 started at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1055: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 30598 at Tue Nov 8 16:13:38 UTC 2011 kill -USR1 30598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30598 killed at Tue Nov 8 16:13:38 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30655 >/dev/null 2>/dev/null selfserv_9519 with PID 30655 found at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 with PID 30655 started at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1056: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 30655 at Tue Nov 8 16:13:38 UTC 2011 kill -USR1 30655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30655 killed at Tue Nov 8 16:13:38 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30712 >/dev/null 2>/dev/null selfserv_9519 with PID 30712 found at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 with PID 30712 started at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 30712 at Tue Nov 8 16:13:38 UTC 2011 kill -USR1 30712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30712 killed at Tue Nov 8 16:13:38 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30769 >/dev/null 2>/dev/null selfserv_9519 with PID 30769 found at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 with PID 30769 started at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 30769 at Tue Nov 8 16:13:38 UTC 2011 kill -USR1 30769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30769 killed at Tue Nov 8 16:13:38 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30826 >/dev/null 2>/dev/null selfserv_9519 with PID 30826 found at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 with PID 30826 started at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 30826 at Tue Nov 8 16:13:38 UTC 2011 kill -USR1 30826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30826 killed at Tue Nov 8 16:13:38 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30887 >/dev/null 2>/dev/null selfserv_9519 with PID 30887 found at Tue Nov 8 16:13:38 UTC 2011 selfserv_9519 with PID 30887 started at Tue Nov 8 16:13:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 30887 at Tue Nov 8 16:13:39 UTC 2011 kill -USR1 30887 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30887 killed at Tue Nov 8 16:13:39 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 30944 >/dev/null 2>/dev/null selfserv_9519 with PID 30944 found at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 with PID 30944 started at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1061: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 30944 at Tue Nov 8 16:13:39 UTC 2011 kill -USR1 30944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 30944 killed at Tue Nov 8 16:13:39 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31001 >/dev/null 2>/dev/null selfserv_9519 with PID 31001 found at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 with PID 31001 started at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1062: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 31001 at Tue Nov 8 16:13:39 UTC 2011 kill -USR1 31001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31001 killed at Tue Nov 8 16:13:39 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31058 >/dev/null 2>/dev/null selfserv_9519 with PID 31058 found at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 with PID 31058 started at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 31058 at Tue Nov 8 16:13:39 UTC 2011 kill -USR1 31058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31058 killed at Tue Nov 8 16:13:39 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31115 >/dev/null 2>/dev/null selfserv_9519 with PID 31115 found at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 with PID 31115 started at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 31115 at Tue Nov 8 16:13:39 UTC 2011 kill -USR1 31115 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31115 killed at Tue Nov 8 16:13:39 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31172 >/dev/null 2>/dev/null selfserv_9519 with PID 31172 found at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 with PID 31172 started at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 31172 at Tue Nov 8 16:13:39 UTC 2011 kill -USR1 31172 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31172 killed at Tue Nov 8 16:13:39 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31229 >/dev/null 2>/dev/null selfserv_9519 with PID 31229 found at Tue Nov 8 16:13:39 UTC 2011 selfserv_9519 with PID 31229 started at Tue Nov 8 16:13:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 31229 at Tue Nov 8 16:13:40 UTC 2011 kill -USR1 31229 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31229 killed at Tue Nov 8 16:13:40 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31286 >/dev/null 2>/dev/null selfserv_9519 with PID 31286 found at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 with PID 31286 started at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1067: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 31286 at Tue Nov 8 16:13:40 UTC 2011 kill -USR1 31286 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31286 killed at Tue Nov 8 16:13:40 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31343 >/dev/null 2>/dev/null selfserv_9519 with PID 31343 found at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 with PID 31343 started at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1068: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 31343 at Tue Nov 8 16:13:40 UTC 2011 kill -USR1 31343 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31343 killed at Tue Nov 8 16:13:40 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31400 >/dev/null 2>/dev/null selfserv_9519 with PID 31400 found at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 with PID 31400 started at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 31400 at Tue Nov 8 16:13:40 UTC 2011 kill -USR1 31400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31400 killed at Tue Nov 8 16:13:40 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31457 >/dev/null 2>/dev/null selfserv_9519 with PID 31457 found at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 with PID 31457 started at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 31457 at Tue Nov 8 16:13:40 UTC 2011 kill -USR1 31457 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31457 killed at Tue Nov 8 16:13:40 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31514 >/dev/null 2>/dev/null selfserv_9519 with PID 31514 found at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 with PID 31514 started at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 31514 at Tue Nov 8 16:13:40 UTC 2011 kill -USR1 31514 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31514 killed at Tue Nov 8 16:13:40 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31571 >/dev/null 2>/dev/null selfserv_9519 with PID 31571 found at Tue Nov 8 16:13:40 UTC 2011 selfserv_9519 with PID 31571 started at Tue Nov 8 16:13:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 31571 at Tue Nov 8 16:13:41 UTC 2011 kill -USR1 31571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31571 killed at Tue Nov 8 16:13:41 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31628 >/dev/null 2>/dev/null selfserv_9519 with PID 31628 found at Tue Nov 8 16:13:41 UTC 2011 selfserv_9519 with PID 31628 started at Tue Nov 8 16:13:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1073: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 31628 at Tue Nov 8 16:13:41 UTC 2011 kill -USR1 31628 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31628 killed at Tue Nov 8 16:13:41 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31685 >/dev/null 2>/dev/null selfserv_9519 with PID 31685 found at Tue Nov 8 16:13:41 UTC 2011 selfserv_9519 with PID 31685 started at Tue Nov 8 16:13:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1074: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 31685 at Tue Nov 8 16:13:41 UTC 2011 kill -USR1 31685 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31685 killed at Tue Nov 8 16:13:41 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 31742 >/dev/null 2>/dev/null selfserv_9519 with PID 31742 found at Tue Nov 8 16:13:41 UTC 2011 selfserv_9519 with PID 31742 started at Tue Nov 8 16:13:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 31742 at Tue Nov 8 16:13:41 UTC 2011 kill -USR1 31742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 31742 killed at Tue Nov 8 16:13:41 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 32177 >/dev/null 2>/dev/null selfserv_9519 with PID 32177 found at Tue Nov 8 16:13:41 UTC 2011 selfserv_9519 with PID 32177 started at Tue Nov 8 16:13:41 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:41 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:42 UTC 2011 ssl.sh: #1076: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 32177 at Tue Nov 8 16:13:42 UTC 2011 kill -USR1 32177 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 32177 killed at Tue Nov 8 16:13:42 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:13:42 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:42 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 32253 >/dev/null 2>/dev/null selfserv_9519 with PID 32253 found at Tue Nov 8 16:13:42 UTC 2011 selfserv_9519 with PID 32253 started at Tue Nov 8 16:13:42 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:42 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:42 UTC 2011 ssl.sh: #1077: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 32253 at Tue Nov 8 16:13:42 UTC 2011 kill -USR1 32253 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 32253 killed at Tue Nov 8 16:13:42 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:42 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:42 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 32329 >/dev/null 2>/dev/null selfserv_9519 with PID 32329 found at Tue Nov 8 16:13:42 UTC 2011 selfserv_9519 with PID 32329 started at Tue Nov 8 16:13:42 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:42 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:42 UTC 2011 ssl.sh: #1078: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 32329 at Tue Nov 8 16:13:42 UTC 2011 kill -USR1 32329 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 32329 killed at Tue Nov 8 16:13:42 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:13:42 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:42 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 32405 >/dev/null 2>/dev/null selfserv_9519 with PID 32405 found at Tue Nov 8 16:13:42 UTC 2011 selfserv_9519 with PID 32405 started at Tue Nov 8 16:13:42 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:42 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:43 UTC 2011 ssl.sh: #1079: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 32405 at Tue Nov 8 16:13:43 UTC 2011 kill -USR1 32405 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 32405 killed at Tue Nov 8 16:13:43 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:13:43 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 32481 >/dev/null 2>/dev/null selfserv_9519 with PID 32481 found at Tue Nov 8 16:13:43 UTC 2011 selfserv_9519 with PID 32481 started at Tue Nov 8 16:13:43 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:43 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:43 UTC 2011 ssl.sh: #1080: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 32481 at Tue Nov 8 16:13:43 UTC 2011 kill -USR1 32481 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 32481 killed at Tue Nov 8 16:13:43 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:13:43 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 32557 >/dev/null 2>/dev/null selfserv_9519 with PID 32557 found at Tue Nov 8 16:13:43 UTC 2011 selfserv_9519 with PID 32557 started at Tue Nov 8 16:13:43 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:43 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:44 UTC 2011 ssl.sh: #1081: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 32557 at Tue Nov 8 16:13:44 UTC 2011 kill -USR1 32557 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 32557 killed at Tue Nov 8 16:13:44 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:44 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 32633 >/dev/null 2>/dev/null selfserv_9519 with PID 32633 found at Tue Nov 8 16:13:44 UTC 2011 selfserv_9519 with PID 32633 started at Tue Nov 8 16:13:44 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:44 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:13:44 UTC 2011 ssl.sh: #1082: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 32633 at Tue Nov 8 16:13:44 UTC 2011 kill -USR1 32633 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 32633 killed at Tue Nov 8 16:13:44 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:44 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 32738 >/dev/null 2>/dev/null selfserv_9519 with PID 32738 found at Tue Nov 8 16:13:44 UTC 2011 selfserv_9519 with PID 32738 started at Tue Nov 8 16:13:44 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:44 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:45 UTC 2011 ssl.sh: #1083: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 32738 at Tue Nov 8 16:13:45 UTC 2011 kill -USR1 32738 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 32738 killed at Tue Nov 8 16:13:45 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 351 >/dev/null 2>/dev/null selfserv_9519 with PID 351 found at Tue Nov 8 16:13:45 UTC 2011 selfserv_9519 with PID 351 started at Tue Nov 8 16:13:45 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:45 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:13:45 UTC 2011 ssl.sh: #1084: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 351 at Tue Nov 8 16:13:45 UTC 2011 kill -USR1 351 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 351 killed at Tue Nov 8 16:13:45 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 428 >/dev/null 2>/dev/null selfserv_9519 with PID 428 found at Tue Nov 8 16:13:45 UTC 2011 selfserv_9519 with PID 428 started at Tue Nov 8 16:13:45 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:45 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:46 UTC 2011 ssl.sh: #1085: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 428 at Tue Nov 8 16:13:46 UTC 2011 kill -USR1 428 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 428 killed at Tue Nov 8 16:13:46 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 509 >/dev/null 2>/dev/null selfserv_9519 with PID 509 found at Tue Nov 8 16:13:46 UTC 2011 selfserv_9519 with PID 509 started at Tue Nov 8 16:13:46 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:46 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:46 UTC 2011 ssl.sh: #1086: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 509 at Tue Nov 8 16:13:46 UTC 2011 kill -USR1 509 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 509 killed at Tue Nov 8 16:13:46 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 585 >/dev/null 2>/dev/null selfserv_9519 with PID 585 found at Tue Nov 8 16:13:46 UTC 2011 selfserv_9519 with PID 585 started at Tue Nov 8 16:13:46 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:46 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:13:46 UTC 2011 ssl.sh: #1087: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 585 at Tue Nov 8 16:13:46 UTC 2011 kill -USR1 585 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 585 killed at Tue Nov 8 16:13:46 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 661 >/dev/null 2>/dev/null selfserv_9519 with PID 661 found at Tue Nov 8 16:13:46 UTC 2011 selfserv_9519 with PID 661 started at Tue Nov 8 16:13:46 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:46 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:46 UTC 2011 ssl.sh: #1088: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 661 at Tue Nov 8 16:13:46 UTC 2011 kill -USR1 661 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 661 killed at Tue Nov 8 16:13:46 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:13:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 740 >/dev/null 2>/dev/null selfserv_9519 with PID 740 found at Tue Nov 8 16:13:46 UTC 2011 selfserv_9519 with PID 740 started at Tue Nov 8 16:13:46 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:13:46 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:13:47 UTC 2011 ssl.sh: #1089: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 740 at Tue Nov 8 16:13:47 UTC 2011 kill -USR1 740 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 740 killed at Tue Nov 8 16:13:47 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #1090: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -list ssl.sh: #1091: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1092: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1093: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -list ssl.sh: #1094: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1095: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9519 starting at Tue Nov 8 16:13:47 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:47 UTC 2011 selfserv_9519 with PID 976 started at Tue Nov 8 16:13:47 UTC 2011 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1096: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1097: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1098: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1099: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1100: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1101: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1102: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1103: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1104: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1105: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1106: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1107: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1108: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1109: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1110: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1111: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1112: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1113: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1114: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 976 >/dev/null 2>/dev/null selfserv_9519 with PID 976 found at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1115: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 976 at Tue Nov 8 16:13:48 UTC 2011 kill -USR1 976 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 976 killed at Tue Nov 8 16:13:48 UTC 2011 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2322 >/dev/null 2>/dev/null selfserv_9519 with PID 2322 found at Tue Nov 8 16:13:48 UTC 2011 selfserv_9519 with PID 2322 started at Tue Nov 8 16:13:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1116: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2322 at Tue Nov 8 16:13:49 UTC 2011 kill -USR1 2322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2322 killed at Tue Nov 8 16:13:49 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:49 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2379 >/dev/null 2>/dev/null selfserv_9519 with PID 2379 found at Tue Nov 8 16:13:49 UTC 2011 selfserv_9519 with PID 2379 started at Tue Nov 8 16:13:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2379 at Tue Nov 8 16:13:49 UTC 2011 kill -USR1 2379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2379 killed at Tue Nov 8 16:13:49 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:49 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2436 >/dev/null 2>/dev/null selfserv_9519 with PID 2436 found at Tue Nov 8 16:13:49 UTC 2011 selfserv_9519 with PID 2436 started at Tue Nov 8 16:13:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2436 at Tue Nov 8 16:13:49 UTC 2011 kill -USR1 2436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2436 killed at Tue Nov 8 16:13:49 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:49 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2493 >/dev/null 2>/dev/null selfserv_9519 with PID 2493 found at Tue Nov 8 16:13:49 UTC 2011 selfserv_9519 with PID 2493 started at Tue Nov 8 16:13:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1119: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 2493 at Tue Nov 8 16:13:49 UTC 2011 kill -USR1 2493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2493 killed at Tue Nov 8 16:13:49 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:49 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2550 >/dev/null 2>/dev/null selfserv_9519 with PID 2550 found at Tue Nov 8 16:13:49 UTC 2011 selfserv_9519 with PID 2550 started at Tue Nov 8 16:13:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1120: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 2550 at Tue Nov 8 16:13:50 UTC 2011 kill -USR1 2550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2550 killed at Tue Nov 8 16:13:50 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:50 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2607 >/dev/null 2>/dev/null selfserv_9519 with PID 2607 found at Tue Nov 8 16:13:50 UTC 2011 selfserv_9519 with PID 2607 started at Tue Nov 8 16:13:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2607 at Tue Nov 8 16:13:50 UTC 2011 kill -USR1 2607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2607 killed at Tue Nov 8 16:13:50 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:50 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2664 >/dev/null 2>/dev/null selfserv_9519 with PID 2664 found at Tue Nov 8 16:13:50 UTC 2011 selfserv_9519 with PID 2664 started at Tue Nov 8 16:13:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2664 at Tue Nov 8 16:13:50 UTC 2011 kill -USR1 2664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2664 killed at Tue Nov 8 16:13:50 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:50 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2721 >/dev/null 2>/dev/null selfserv_9519 with PID 2721 found at Tue Nov 8 16:13:50 UTC 2011 selfserv_9519 with PID 2721 started at Tue Nov 8 16:13:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2721 at Tue Nov 8 16:13:50 UTC 2011 kill -USR1 2721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2721 killed at Tue Nov 8 16:13:50 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:50 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2778 >/dev/null 2>/dev/null selfserv_9519 with PID 2778 found at Tue Nov 8 16:13:50 UTC 2011 selfserv_9519 with PID 2778 started at Tue Nov 8 16:13:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2778 at Tue Nov 8 16:13:51 UTC 2011 kill -USR1 2778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2778 killed at Tue Nov 8 16:13:51 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2835 >/dev/null 2>/dev/null selfserv_9519 with PID 2835 found at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 with PID 2835 started at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1125: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 2835 at Tue Nov 8 16:13:51 UTC 2011 kill -USR1 2835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2835 killed at Tue Nov 8 16:13:51 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2892 >/dev/null 2>/dev/null selfserv_9519 with PID 2892 found at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 with PID 2892 started at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1126: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 2892 at Tue Nov 8 16:13:51 UTC 2011 kill -USR1 2892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2892 killed at Tue Nov 8 16:13:51 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2949 >/dev/null 2>/dev/null selfserv_9519 with PID 2949 found at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 with PID 2949 started at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2949 at Tue Nov 8 16:13:51 UTC 2011 kill -USR1 2949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2949 killed at Tue Nov 8 16:13:51 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3006 >/dev/null 2>/dev/null selfserv_9519 with PID 3006 found at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 with PID 3006 started at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3006 at Tue Nov 8 16:13:51 UTC 2011 kill -USR1 3006 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3006 killed at Tue Nov 8 16:13:51 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3063 >/dev/null 2>/dev/null selfserv_9519 with PID 3063 found at Tue Nov 8 16:13:51 UTC 2011 selfserv_9519 with PID 3063 started at Tue Nov 8 16:13:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3063 at Tue Nov 8 16:13:52 UTC 2011 kill -USR1 3063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3063 killed at Tue Nov 8 16:13:52 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3120 >/dev/null 2>/dev/null selfserv_9519 with PID 3120 found at Tue Nov 8 16:13:52 UTC 2011 selfserv_9519 with PID 3120 started at Tue Nov 8 16:13:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3120 at Tue Nov 8 16:13:52 UTC 2011 kill -USR1 3120 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3120 killed at Tue Nov 8 16:13:52 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3177 >/dev/null 2>/dev/null selfserv_9519 with PID 3177 found at Tue Nov 8 16:13:52 UTC 2011 selfserv_9519 with PID 3177 started at Tue Nov 8 16:13:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1131: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3177 at Tue Nov 8 16:13:52 UTC 2011 kill -USR1 3177 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3177 killed at Tue Nov 8 16:13:52 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3234 >/dev/null 2>/dev/null selfserv_9519 with PID 3234 found at Tue Nov 8 16:13:52 UTC 2011 selfserv_9519 with PID 3234 started at Tue Nov 8 16:13:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1132: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3234 at Tue Nov 8 16:13:52 UTC 2011 kill -USR1 3234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3234 killed at Tue Nov 8 16:13:52 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3291 >/dev/null 2>/dev/null selfserv_9519 with PID 3291 found at Tue Nov 8 16:13:52 UTC 2011 selfserv_9519 with PID 3291 started at Tue Nov 8 16:13:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3291 at Tue Nov 8 16:13:53 UTC 2011 kill -USR1 3291 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3291 killed at Tue Nov 8 16:13:53 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:53 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3348 >/dev/null 2>/dev/null selfserv_9519 with PID 3348 found at Tue Nov 8 16:13:53 UTC 2011 selfserv_9519 with PID 3348 started at Tue Nov 8 16:13:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3348 at Tue Nov 8 16:13:53 UTC 2011 kill -USR1 3348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3348 killed at Tue Nov 8 16:13:53 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:53 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3405 >/dev/null 2>/dev/null selfserv_9519 with PID 3405 found at Tue Nov 8 16:13:53 UTC 2011 selfserv_9519 with PID 3405 started at Tue Nov 8 16:13:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3405 at Tue Nov 8 16:13:53 UTC 2011 kill -USR1 3405 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3405 killed at Tue Nov 8 16:13:53 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:53 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3462 >/dev/null 2>/dev/null selfserv_9519 with PID 3462 found at Tue Nov 8 16:13:53 UTC 2011 selfserv_9519 with PID 3462 started at Tue Nov 8 16:13:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3462 at Tue Nov 8 16:13:53 UTC 2011 kill -USR1 3462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3462 killed at Tue Nov 8 16:13:53 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:53 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3519 >/dev/null 2>/dev/null selfserv_9519 with PID 3519 found at Tue Nov 8 16:13:53 UTC 2011 selfserv_9519 with PID 3519 started at Tue Nov 8 16:13:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1137: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3519 at Tue Nov 8 16:13:54 UTC 2011 kill -USR1 3519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3519 killed at Tue Nov 8 16:13:54 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:13:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3576 >/dev/null 2>/dev/null selfserv_9519 with PID 3576 found at Tue Nov 8 16:13:54 UTC 2011 selfserv_9519 with PID 3576 started at Tue Nov 8 16:13:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1138: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3576 at Tue Nov 8 16:13:54 UTC 2011 kill -USR1 3576 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3576 killed at Tue Nov 8 16:13:54 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:13:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3634 >/dev/null 2>/dev/null selfserv_9519 with PID 3634 found at Tue Nov 8 16:13:54 UTC 2011 selfserv_9519 with PID 3634 started at Tue Nov 8 16:13:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3634 at Tue Nov 8 16:13:54 UTC 2011 kill -USR1 3634 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3634 killed at Tue Nov 8 16:13:54 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3759 >/dev/null 2>/dev/null selfserv_9519 with PID 3759 found at Tue Nov 8 16:13:54 UTC 2011 selfserv_9519 with PID 3759 started at Tue Nov 8 16:13:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3759 at Tue Nov 8 16:13:54 UTC 2011 kill -USR1 3759 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3759 killed at Tue Nov 8 16:13:54 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3822 >/dev/null 2>/dev/null selfserv_9519 with PID 3822 found at Tue Nov 8 16:13:54 UTC 2011 selfserv_9519 with PID 3822 started at Tue Nov 8 16:13:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3822 at Tue Nov 8 16:13:55 UTC 2011 kill -USR1 3822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3822 killed at Tue Nov 8 16:13:55 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:13:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3885 >/dev/null 2>/dev/null selfserv_9519 with PID 3885 found at Tue Nov 8 16:13:55 UTC 2011 selfserv_9519 with PID 3885 started at Tue Nov 8 16:13:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1142: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 3885 at Tue Nov 8 16:13:55 UTC 2011 kill -USR1 3885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3885 killed at Tue Nov 8 16:13:55 UTC 2011 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3948 >/dev/null 2>/dev/null selfserv_9519 with PID 3948 found at Tue Nov 8 16:13:55 UTC 2011 selfserv_9519 with PID 3948 started at Tue Nov 8 16:13:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3948 at Tue Nov 8 16:13:55 UTC 2011 kill -USR1 3948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3948 killed at Tue Nov 8 16:13:55 UTC 2011 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9519 starting at Tue Nov 8 16:13:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4011 >/dev/null 2>/dev/null selfserv_9519 with PID 4011 found at Tue Nov 8 16:13:55 UTC 2011 selfserv_9519 with PID 4011 started at Tue Nov 8 16:13:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #1144: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4011 at Tue Nov 8 16:13:55 UTC 2011 kill -USR1 4011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4011 killed at Tue Nov 8 16:13:55 UTC 2011 ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4074 >/dev/null 2>/dev/null selfserv_9519 with PID 4074 found at Tue Nov 8 16:13:55 UTC 2011 selfserv_9519 with PID 4074 started at Tue Nov 8 16:13:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4074 at Tue Nov 8 16:13:55 UTC 2011 kill -USR1 4074 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4074 killed at Tue Nov 8 16:13:55 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:13:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4137 >/dev/null 2>/dev/null selfserv_9519 with PID 4137 found at Tue Nov 8 16:13:56 UTC 2011 selfserv_9519 with PID 4137 started at Tue Nov 8 16:13:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4137 at Tue Nov 8 16:13:56 UTC 2011 kill -USR1 4137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4137 killed at Tue Nov 8 16:13:56 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:13:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4200 >/dev/null 2>/dev/null selfserv_9519 with PID 4200 found at Tue Nov 8 16:13:59 UTC 2011 selfserv_9519 with PID 4200 started at Tue Nov 8 16:13:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1147: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4200 at Tue Nov 8 16:13:59 UTC 2011 kill -USR1 4200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4200 killed at Tue Nov 8 16:13:59 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:13:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4267 >/dev/null 2>/dev/null selfserv_9519 with PID 4267 found at Tue Nov 8 16:13:59 UTC 2011 selfserv_9519 with PID 4267 started at Tue Nov 8 16:13:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1148: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4267 at Tue Nov 8 16:13:59 UTC 2011 kill -USR1 4267 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4267 killed at Tue Nov 8 16:13:59 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:13:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:13:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4330 >/dev/null 2>/dev/null selfserv_9519 with PID 4330 found at Tue Nov 8 16:13:59 UTC 2011 selfserv_9519 with PID 4330 started at Tue Nov 8 16:13:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1149: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 4330 at Tue Nov 8 16:13:59 UTC 2011 kill -USR1 4330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4330 killed at Tue Nov 8 16:13:59 UTC 2011 ssl.sh: SSL Stress Test - server fips/client normal =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:14:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4683 >/dev/null 2>/dev/null selfserv_9519 with PID 4683 found at Tue Nov 8 16:14:00 UTC 2011 selfserv_9519 with PID 4683 started at Tue Nov 8 16:14:00 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:00 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:00 UTC 2011 ssl.sh: #1150: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 4683 at Tue Nov 8 16:14:00 UTC 2011 kill -USR1 4683 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4683 killed at Tue Nov 8 16:14:00 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:14:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4760 >/dev/null 2>/dev/null selfserv_9519 with PID 4760 found at Tue Nov 8 16:14:00 UTC 2011 selfserv_9519 with PID 4760 started at Tue Nov 8 16:14:00 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:00 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:00 UTC 2011 ssl.sh: #1151: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 4760 at Tue Nov 8 16:14:00 UTC 2011 kill -USR1 4760 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4760 killed at Tue Nov 8 16:14:00 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4836 >/dev/null 2>/dev/null selfserv_9519 with PID 4836 found at Tue Nov 8 16:14:01 UTC 2011 selfserv_9519 with PID 4836 started at Tue Nov 8 16:14:01 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:01 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:01 UTC 2011 ssl.sh: #1152: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 4836 at Tue Nov 8 16:14:01 UTC 2011 kill -USR1 4836 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4836 killed at Tue Nov 8 16:14:01 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:14:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4912 >/dev/null 2>/dev/null selfserv_9519 with PID 4912 found at Tue Nov 8 16:14:01 UTC 2011 selfserv_9519 with PID 4912 started at Tue Nov 8 16:14:01 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:01 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:02 UTC 2011 ssl.sh: #1153: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 4912 at Tue Nov 8 16:14:02 UTC 2011 kill -USR1 4912 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4912 killed at Tue Nov 8 16:14:02 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:14:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4988 >/dev/null 2>/dev/null selfserv_9519 with PID 4988 found at Tue Nov 8 16:14:05 UTC 2011 selfserv_9519 with PID 4988 started at Tue Nov 8 16:14:05 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:05 UTC 2011 ssl.sh: #1154: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 4988 at Tue Nov 8 16:14:05 UTC 2011 kill -USR1 4988 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4988 killed at Tue Nov 8 16:14:05 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:14:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5066 >/dev/null 2>/dev/null selfserv_9519 with PID 5066 found at Tue Nov 8 16:14:05 UTC 2011 selfserv_9519 with PID 5066 started at Tue Nov 8 16:14:05 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:06 UTC 2011 ssl.sh: #1155: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5066 at Tue Nov 8 16:14:06 UTC 2011 kill -USR1 5066 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5066 killed at Tue Nov 8 16:14:06 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:06 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5142 >/dev/null 2>/dev/null selfserv_9519 with PID 5142 found at Tue Nov 8 16:14:06 UTC 2011 selfserv_9519 with PID 5142 started at Tue Nov 8 16:14:06 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:06 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:06 UTC 2011 ssl.sh: #1156: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5142 at Tue Nov 8 16:14:06 UTC 2011 kill -USR1 5142 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5142 killed at Tue Nov 8 16:14:06 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9519 starting at Tue Nov 8 16:14:06 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5224 >/dev/null 2>/dev/null selfserv_9519 with PID 5224 found at Tue Nov 8 16:14:06 UTC 2011 selfserv_9519 with PID 5224 started at Tue Nov 8 16:14:06 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:06 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:07 UTC 2011 ssl.sh: #1157: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5224 at Tue Nov 8 16:14:07 UTC 2011 kill -USR1 5224 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5224 killed at Tue Nov 8 16:14:07 UTC 2011 ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:07 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5325 >/dev/null 2>/dev/null selfserv_9519 with PID 5325 found at Tue Nov 8 16:14:07 UTC 2011 selfserv_9519 with PID 5325 started at Tue Nov 8 16:14:07 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:07 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:14:07 UTC 2011 ssl.sh: #1158: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5325 at Tue Nov 8 16:14:07 UTC 2011 kill -USR1 5325 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5325 killed at Tue Nov 8 16:14:07 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:07 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5400 >/dev/null 2>/dev/null selfserv_9519 with PID 5400 found at Tue Nov 8 16:14:07 UTC 2011 selfserv_9519 with PID 5400 started at Tue Nov 8 16:14:07 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:07 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:14:08 UTC 2011 ssl.sh: #1159: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5400 at Tue Nov 8 16:14:08 UTC 2011 kill -USR1 5400 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5400 killed at Tue Nov 8 16:14:08 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5475 >/dev/null 2>/dev/null selfserv_9519 with PID 5475 found at Tue Nov 8 16:14:08 UTC 2011 selfserv_9519 with PID 5475 started at Tue Nov 8 16:14:08 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:08 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:08 UTC 2011 ssl.sh: #1160: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5475 at Tue Nov 8 16:14:08 UTC 2011 kill -USR1 5475 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5475 killed at Tue Nov 8 16:14:08 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5551 >/dev/null 2>/dev/null selfserv_9519 with PID 5551 found at Tue Nov 8 16:14:08 UTC 2011 selfserv_9519 with PID 5551 started at Tue Nov 8 16:14:08 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:08 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:08 UTC 2011 ssl.sh: #1161: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5551 at Tue Nov 8 16:14:08 UTC 2011 kill -USR1 5551 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5551 killed at Tue Nov 8 16:14:08 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5627 >/dev/null 2>/dev/null selfserv_9519 with PID 5627 found at Tue Nov 8 16:14:08 UTC 2011 selfserv_9519 with PID 5627 started at Tue Nov 8 16:14:08 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:08 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:08 UTC 2011 ssl.sh: #1162: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5627 at Tue Nov 8 16:14:09 UTC 2011 kill -USR1 5627 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5627 killed at Tue Nov 8 16:14:09 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5707 >/dev/null 2>/dev/null selfserv_9519 with PID 5707 found at Tue Nov 8 16:14:09 UTC 2011 selfserv_9519 with PID 5707 started at Tue Nov 8 16:14:09 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:09 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:09 UTC 2011 ssl.sh: #1163: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5707 at Tue Nov 8 16:14:09 UTC 2011 kill -USR1 5707 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5707 killed at Tue Nov 8 16:14:09 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5783 >/dev/null 2>/dev/null selfserv_9519 with PID 5783 found at Tue Nov 8 16:14:09 UTC 2011 selfserv_9519 with PID 5783 started at Tue Nov 8 16:14:09 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:09 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:09 UTC 2011 ssl.sh: #1164: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5783 at Tue Nov 8 16:14:09 UTC 2011 kill -USR1 5783 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5783 killed at Tue Nov 8 16:14:09 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9519 starting at Tue Nov 8 16:14:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5865 >/dev/null 2>/dev/null selfserv_9519 with PID 5865 found at Tue Nov 8 16:14:09 UTC 2011 selfserv_9519 with PID 5865 started at Tue Nov 8 16:14:09 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:09 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:10 UTC 2011 ssl.sh: #1165: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5865 at Tue Nov 8 16:14:10 UTC 2011 kill -USR1 5865 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5865 killed at Tue Nov 8 16:14:10 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9519 starting at Tue Nov 8 16:14:10 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5947 >/dev/null 2>/dev/null selfserv_9519 with PID 5947 found at Tue Nov 8 16:14:10 UTC 2011 selfserv_9519 with PID 5947 started at Tue Nov 8 16:14:10 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:10 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:10 UTC 2011 ssl.sh: #1166: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 5947 at Tue Nov 8 16:14:10 UTC 2011 kill -USR1 5947 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5947 killed at Tue Nov 8 16:14:10 UTC 2011 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9519 starting at Tue Nov 8 16:14:10 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:10 UTC 2011 selfserv_9519 with PID 6100 started at Tue Nov 8 16:14:10 UTC 2011 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 6100 >/dev/null 2>/dev/null selfserv_9519 with PID 6100 found at Tue Nov 8 16:14:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 6100 at Tue Nov 8 16:14:11 UTC 2011 kill -USR1 6100 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6100 killed at Tue Nov 8 16:14:11 UTC 2011 ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7416 >/dev/null 2>/dev/null selfserv_9519 with PID 7416 found at Tue Nov 8 16:14:12 UTC 2011 selfserv_9519 with PID 7416 started at Tue Nov 8 16:14:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7416 at Tue Nov 8 16:14:12 UTC 2011 kill -USR1 7416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7416 killed at Tue Nov 8 16:14:12 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7473 >/dev/null 2>/dev/null selfserv_9519 with PID 7473 found at Tue Nov 8 16:14:12 UTC 2011 selfserv_9519 with PID 7473 started at Tue Nov 8 16:14:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7473 at Tue Nov 8 16:14:12 UTC 2011 kill -USR1 7473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7473 killed at Tue Nov 8 16:14:12 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7530 >/dev/null 2>/dev/null selfserv_9519 with PID 7530 found at Tue Nov 8 16:14:12 UTC 2011 selfserv_9519 with PID 7530 started at Tue Nov 8 16:14:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7530 at Tue Nov 8 16:14:12 UTC 2011 kill -USR1 7530 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7530 killed at Tue Nov 8 16:14:12 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7587 >/dev/null 2>/dev/null selfserv_9519 with PID 7587 found at Tue Nov 8 16:14:12 UTC 2011 selfserv_9519 with PID 7587 started at Tue Nov 8 16:14:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1190: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7587 at Tue Nov 8 16:14:13 UTC 2011 kill -USR1 7587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7587 killed at Tue Nov 8 16:14:13 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7644 >/dev/null 2>/dev/null selfserv_9519 with PID 7644 found at Tue Nov 8 16:14:13 UTC 2011 selfserv_9519 with PID 7644 started at Tue Nov 8 16:14:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1191: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7644 at Tue Nov 8 16:14:13 UTC 2011 kill -USR1 7644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7644 killed at Tue Nov 8 16:14:13 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7701 >/dev/null 2>/dev/null selfserv_9519 with PID 7701 found at Tue Nov 8 16:14:13 UTC 2011 selfserv_9519 with PID 7701 started at Tue Nov 8 16:14:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7701 at Tue Nov 8 16:14:13 UTC 2011 kill -USR1 7701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7701 killed at Tue Nov 8 16:14:13 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7758 >/dev/null 2>/dev/null selfserv_9519 with PID 7758 found at Tue Nov 8 16:14:13 UTC 2011 selfserv_9519 with PID 7758 started at Tue Nov 8 16:14:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7758 at Tue Nov 8 16:14:13 UTC 2011 kill -USR1 7758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7758 killed at Tue Nov 8 16:14:13 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7815 >/dev/null 2>/dev/null selfserv_9519 with PID 7815 found at Tue Nov 8 16:14:13 UTC 2011 selfserv_9519 with PID 7815 started at Tue Nov 8 16:14:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7815 at Tue Nov 8 16:14:13 UTC 2011 kill -USR1 7815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7815 killed at Tue Nov 8 16:14:13 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7872 >/dev/null 2>/dev/null selfserv_9519 with PID 7872 found at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 with PID 7872 started at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7872 at Tue Nov 8 16:14:14 UTC 2011 kill -USR1 7872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7872 killed at Tue Nov 8 16:14:14 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7929 >/dev/null 2>/dev/null selfserv_9519 with PID 7929 found at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 with PID 7929 started at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1196: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7929 at Tue Nov 8 16:14:14 UTC 2011 kill -USR1 7929 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7929 killed at Tue Nov 8 16:14:14 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7986 >/dev/null 2>/dev/null selfserv_9519 with PID 7986 found at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 with PID 7986 started at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1197: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7986 at Tue Nov 8 16:14:14 UTC 2011 kill -USR1 7986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7986 killed at Tue Nov 8 16:14:14 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8043 >/dev/null 2>/dev/null selfserv_9519 with PID 8043 found at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 with PID 8043 started at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8043 at Tue Nov 8 16:14:14 UTC 2011 kill -USR1 8043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8043 killed at Tue Nov 8 16:14:14 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8100 >/dev/null 2>/dev/null selfserv_9519 with PID 8100 found at Tue Nov 8 16:14:14 UTC 2011 selfserv_9519 with PID 8100 started at Tue Nov 8 16:14:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8100 at Tue Nov 8 16:14:15 UTC 2011 kill -USR1 8100 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8100 killed at Tue Nov 8 16:14:15 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8157 >/dev/null 2>/dev/null selfserv_9519 with PID 8157 found at Tue Nov 8 16:14:15 UTC 2011 selfserv_9519 with PID 8157 started at Tue Nov 8 16:14:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8157 at Tue Nov 8 16:14:15 UTC 2011 kill -USR1 8157 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8157 killed at Tue Nov 8 16:14:15 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8214 >/dev/null 2>/dev/null selfserv_9519 with PID 8214 found at Tue Nov 8 16:14:15 UTC 2011 selfserv_9519 with PID 8214 started at Tue Nov 8 16:14:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8214 at Tue Nov 8 16:14:15 UTC 2011 kill -USR1 8214 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8214 killed at Tue Nov 8 16:14:15 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8271 >/dev/null 2>/dev/null selfserv_9519 with PID 8271 found at Tue Nov 8 16:14:15 UTC 2011 selfserv_9519 with PID 8271 started at Tue Nov 8 16:14:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1202: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8271 at Tue Nov 8 16:14:15 UTC 2011 kill -USR1 8271 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8271 killed at Tue Nov 8 16:14:15 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8328 >/dev/null 2>/dev/null selfserv_9519 with PID 8328 found at Tue Nov 8 16:14:15 UTC 2011 selfserv_9519 with PID 8328 started at Tue Nov 8 16:14:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1203: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8328 at Tue Nov 8 16:14:16 UTC 2011 kill -USR1 8328 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8328 killed at Tue Nov 8 16:14:16 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8385 >/dev/null 2>/dev/null selfserv_9519 with PID 8385 found at Tue Nov 8 16:14:16 UTC 2011 selfserv_9519 with PID 8385 started at Tue Nov 8 16:14:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8385 at Tue Nov 8 16:14:16 UTC 2011 kill -USR1 8385 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8385 killed at Tue Nov 8 16:14:16 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8443 >/dev/null 2>/dev/null selfserv_9519 with PID 8443 found at Tue Nov 8 16:14:16 UTC 2011 selfserv_9519 with PID 8443 started at Tue Nov 8 16:14:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8443 at Tue Nov 8 16:14:16 UTC 2011 kill -USR1 8443 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8443 killed at Tue Nov 8 16:14:16 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8500 >/dev/null 2>/dev/null selfserv_9519 with PID 8500 found at Tue Nov 8 16:14:16 UTC 2011 selfserv_9519 with PID 8500 started at Tue Nov 8 16:14:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8500 at Tue Nov 8 16:14:16 UTC 2011 kill -USR1 8500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8500 killed at Tue Nov 8 16:14:16 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8557 >/dev/null 2>/dev/null selfserv_9519 with PID 8557 found at Tue Nov 8 16:14:16 UTC 2011 selfserv_9519 with PID 8557 started at Tue Nov 8 16:14:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8557 at Tue Nov 8 16:14:17 UTC 2011 kill -USR1 8557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8557 killed at Tue Nov 8 16:14:17 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:17 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8614 >/dev/null 2>/dev/null selfserv_9519 with PID 8614 found at Tue Nov 8 16:14:17 UTC 2011 selfserv_9519 with PID 8614 started at Tue Nov 8 16:14:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1208: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8614 at Tue Nov 8 16:14:17 UTC 2011 kill -USR1 8614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8614 killed at Tue Nov 8 16:14:17 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:17 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8671 >/dev/null 2>/dev/null selfserv_9519 with PID 8671 found at Tue Nov 8 16:14:17 UTC 2011 selfserv_9519 with PID 8671 started at Tue Nov 8 16:14:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1209: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8671 at Tue Nov 8 16:14:17 UTC 2011 kill -USR1 8671 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8671 killed at Tue Nov 8 16:14:17 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:17 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8729 >/dev/null 2>/dev/null selfserv_9519 with PID 8729 found at Tue Nov 8 16:14:17 UTC 2011 selfserv_9519 with PID 8729 started at Tue Nov 8 16:14:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8729 at Tue Nov 8 16:14:17 UTC 2011 kill -USR1 8729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8729 killed at Tue Nov 8 16:14:17 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server fips/client normal =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:14:18 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9164 >/dev/null 2>/dev/null selfserv_9519 with PID 9164 found at Tue Nov 8 16:14:18 UTC 2011 selfserv_9519 with PID 9164 started at Tue Nov 8 16:14:18 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:18 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:18 UTC 2011 ssl.sh: #1211: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9164 at Tue Nov 8 16:14:18 UTC 2011 kill -USR1 9164 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9164 killed at Tue Nov 8 16:14:18 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:14:18 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9240 >/dev/null 2>/dev/null selfserv_9519 with PID 9240 found at Tue Nov 8 16:14:18 UTC 2011 selfserv_9519 with PID 9240 started at Tue Nov 8 16:14:18 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:18 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:19 UTC 2011 ssl.sh: #1212: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9240 at Tue Nov 8 16:14:19 UTC 2011 kill -USR1 9240 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9240 killed at Tue Nov 8 16:14:19 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:19 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9320 >/dev/null 2>/dev/null selfserv_9519 with PID 9320 found at Tue Nov 8 16:14:19 UTC 2011 selfserv_9519 with PID 9320 started at Tue Nov 8 16:14:19 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:19 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:19 UTC 2011 ssl.sh: #1213: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9320 at Tue Nov 8 16:14:19 UTC 2011 kill -USR1 9320 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9320 killed at Tue Nov 8 16:14:19 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:14:19 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9396 >/dev/null 2>/dev/null selfserv_9519 with PID 9396 found at Tue Nov 8 16:14:19 UTC 2011 selfserv_9519 with PID 9396 started at Tue Nov 8 16:14:19 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:19 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:20 UTC 2011 ssl.sh: #1214: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9396 at Tue Nov 8 16:14:20 UTC 2011 kill -USR1 9396 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9396 killed at Tue Nov 8 16:14:20 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:14:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9472 >/dev/null 2>/dev/null selfserv_9519 with PID 9472 found at Tue Nov 8 16:14:20 UTC 2011 selfserv_9519 with PID 9472 started at Tue Nov 8 16:14:20 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:20 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:20 UTC 2011 ssl.sh: #1215: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9472 at Tue Nov 8 16:14:20 UTC 2011 kill -USR1 9472 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9472 killed at Tue Nov 8 16:14:20 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:14:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9548 >/dev/null 2>/dev/null selfserv_9519 with PID 9548 found at Tue Nov 8 16:14:20 UTC 2011 selfserv_9519 with PID 9548 started at Tue Nov 8 16:14:20 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:20 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:24 UTC 2011 ssl.sh: #1216: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9548 at Tue Nov 8 16:14:24 UTC 2011 kill -USR1 9548 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9548 killed at Tue Nov 8 16:14:24 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9624 >/dev/null 2>/dev/null selfserv_9519 with PID 9624 found at Tue Nov 8 16:14:24 UTC 2011 selfserv_9519 with PID 9624 started at Tue Nov 8 16:14:24 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:24 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:24 UTC 2011 ssl.sh: #1217: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9624 at Tue Nov 8 16:14:24 UTC 2011 kill -USR1 9624 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9624 killed at Tue Nov 8 16:14:24 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9729 >/dev/null 2>/dev/null selfserv_9519 with PID 9729 found at Tue Nov 8 16:14:24 UTC 2011 selfserv_9519 with PID 9729 started at Tue Nov 8 16:14:24 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:24 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:14:25 UTC 2011 ssl.sh: #1218: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9729 at Tue Nov 8 16:14:25 UTC 2011 kill -USR1 9729 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9729 killed at Tue Nov 8 16:14:25 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9804 >/dev/null 2>/dev/null selfserv_9519 with PID 9804 found at Tue Nov 8 16:14:25 UTC 2011 selfserv_9519 with PID 9804 started at Tue Nov 8 16:14:25 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:25 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:14:26 UTC 2011 ssl.sh: #1219: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9804 at Tue Nov 8 16:14:26 UTC 2011 kill -USR1 9804 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9804 killed at Tue Nov 8 16:14:26 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9879 >/dev/null 2>/dev/null selfserv_9519 with PID 9879 found at Tue Nov 8 16:14:26 UTC 2011 selfserv_9519 with PID 9879 started at Tue Nov 8 16:14:26 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:26 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:26 UTC 2011 ssl.sh: #1220: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9879 at Tue Nov 8 16:14:26 UTC 2011 kill -USR1 9879 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9879 killed at Tue Nov 8 16:14:26 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9955 >/dev/null 2>/dev/null selfserv_9519 with PID 9955 found at Tue Nov 8 16:14:26 UTC 2011 selfserv_9519 with PID 9955 started at Tue Nov 8 16:14:26 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:26 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:26 UTC 2011 ssl.sh: #1221: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 9955 at Tue Nov 8 16:14:26 UTC 2011 kill -USR1 9955 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9955 killed at Tue Nov 8 16:14:26 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 10031 >/dev/null 2>/dev/null selfserv_9519 with PID 10031 found at Tue Nov 8 16:14:26 UTC 2011 selfserv_9519 with PID 10031 started at Tue Nov 8 16:14:26 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:26 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:26 UTC 2011 ssl.sh: #1222: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 10031 at Tue Nov 8 16:14:26 UTC 2011 kill -USR1 10031 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 10031 killed at Tue Nov 8 16:14:26 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 10107 >/dev/null 2>/dev/null selfserv_9519 with PID 10107 found at Tue Nov 8 16:14:26 UTC 2011 selfserv_9519 with PID 10107 started at Tue Nov 8 16:14:26 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:26 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:27 UTC 2011 ssl.sh: #1223: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 10107 at Tue Nov 8 16:14:27 UTC 2011 kill -USR1 10107 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 10107 killed at Tue Nov 8 16:14:27 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 10183 >/dev/null 2>/dev/null selfserv_9519 with PID 10183 found at Tue Nov 8 16:14:27 UTC 2011 selfserv_9519 with PID 10183 started at Tue Nov 8 16:14:27 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:27 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:27 UTC 2011 ssl.sh: #1224: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 10183 at Tue Nov 8 16:14:27 UTC 2011 kill -USR1 10183 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 10183 killed at Tue Nov 8 16:14:27 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #1225: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/server -list ssl.sh: #1226: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1227: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1228: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_server -list ssl.sh: #1229: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1230: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1231: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -list ssl.sh: #1232: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1233: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9519 starting at Tue Nov 8 16:14:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 selfserv_9519 with PID 10445 started at Tue Nov 8 16:14:28 UTC 2011 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only) ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1250: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1251: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1252: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 10445 >/dev/null 2>/dev/null selfserv_9519 with PID 10445 found at Tue Nov 8 16:14:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1253: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 10445 at Tue Nov 8 16:14:29 UTC 2011 kill -USR1 10445 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 10445 killed at Tue Nov 8 16:14:29 UTC 2011 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 11772 >/dev/null 2>/dev/null selfserv_9519 with PID 11772 found at Tue Nov 8 16:14:29 UTC 2011 selfserv_9519 with PID 11772 started at Tue Nov 8 16:14:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1254: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 11772 at Tue Nov 8 16:14:29 UTC 2011 kill -USR1 11772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 11772 killed at Tue Nov 8 16:14:29 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 11829 >/dev/null 2>/dev/null selfserv_9519 with PID 11829 found at Tue Nov 8 16:14:29 UTC 2011 selfserv_9519 with PID 11829 started at Tue Nov 8 16:14:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1255: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 11829 at Tue Nov 8 16:14:29 UTC 2011 kill -USR1 11829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 11829 killed at Tue Nov 8 16:14:29 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 11886 >/dev/null 2>/dev/null selfserv_9519 with PID 11886 found at Tue Nov 8 16:14:29 UTC 2011 selfserv_9519 with PID 11886 started at Tue Nov 8 16:14:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1256: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 11886 at Tue Nov 8 16:14:29 UTC 2011 kill -USR1 11886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 11886 killed at Tue Nov 8 16:14:29 UTC 2011 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 11949 >/dev/null 2>/dev/null selfserv_9519 with PID 11949 found at Tue Nov 8 16:14:29 UTC 2011 selfserv_9519 with PID 11949 started at Tue Nov 8 16:14:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1257: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 11949 at Tue Nov 8 16:14:30 UTC 2011 kill -USR1 11949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 11949 killed at Tue Nov 8 16:14:30 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12006 >/dev/null 2>/dev/null selfserv_9519 with PID 12006 found at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 with PID 12006 started at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1258: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12006 at Tue Nov 8 16:14:30 UTC 2011 kill -USR1 12006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12006 killed at Tue Nov 8 16:14:30 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12063 >/dev/null 2>/dev/null selfserv_9519 with PID 12063 found at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 with PID 12063 started at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1259: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12063 at Tue Nov 8 16:14:30 UTC 2011 kill -USR1 12063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12063 killed at Tue Nov 8 16:14:30 UTC 2011 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12126 >/dev/null 2>/dev/null selfserv_9519 with PID 12126 found at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 with PID 12126 started at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1260: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12126 at Tue Nov 8 16:14:30 UTC 2011 kill -USR1 12126 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12126 killed at Tue Nov 8 16:14:30 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12183 >/dev/null 2>/dev/null selfserv_9519 with PID 12183 found at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 with PID 12183 started at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1261: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12183 at Tue Nov 8 16:14:30 UTC 2011 kill -USR1 12183 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12183 killed at Tue Nov 8 16:14:30 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12240 >/dev/null 2>/dev/null selfserv_9519 with PID 12240 found at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 with PID 12240 started at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1262: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12240 at Tue Nov 8 16:14:30 UTC 2011 kill -USR1 12240 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12240 killed at Tue Nov 8 16:14:30 UTC 2011 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12303 >/dev/null 2>/dev/null selfserv_9519 with PID 12303 found at Tue Nov 8 16:14:30 UTC 2011 selfserv_9519 with PID 12303 started at Tue Nov 8 16:14:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1263: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12303 at Tue Nov 8 16:14:31 UTC 2011 kill -USR1 12303 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12303 killed at Tue Nov 8 16:14:31 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12360 >/dev/null 2>/dev/null selfserv_9519 with PID 12360 found at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 with PID 12360 started at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1264: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12360 at Tue Nov 8 16:14:31 UTC 2011 kill -USR1 12360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12360 killed at Tue Nov 8 16:14:31 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12417 >/dev/null 2>/dev/null selfserv_9519 with PID 12417 found at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 with PID 12417 started at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1265: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12417 at Tue Nov 8 16:14:31 UTC 2011 kill -USR1 12417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12417 killed at Tue Nov 8 16:14:31 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12542 >/dev/null 2>/dev/null selfserv_9519 with PID 12542 found at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 with PID 12542 started at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1266: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12542 at Tue Nov 8 16:14:31 UTC 2011 kill -USR1 12542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12542 killed at Tue Nov 8 16:14:31 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12605 >/dev/null 2>/dev/null selfserv_9519 with PID 12605 found at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 with PID 12605 started at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1267: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12605 at Tue Nov 8 16:14:31 UTC 2011 kill -USR1 12605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12605 killed at Tue Nov 8 16:14:31 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12668 >/dev/null 2>/dev/null selfserv_9519 with PID 12668 found at Tue Nov 8 16:14:31 UTC 2011 selfserv_9519 with PID 12668 started at Tue Nov 8 16:14:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1268: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12668 at Tue Nov 8 16:14:32 UTC 2011 kill -USR1 12668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12668 killed at Tue Nov 8 16:14:32 UTC 2011 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12731 >/dev/null 2>/dev/null selfserv_9519 with PID 12731 found at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 with PID 12731 started at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1269: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12731 at Tue Nov 8 16:14:32 UTC 2011 kill -USR1 12731 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12731 killed at Tue Nov 8 16:14:32 UTC 2011 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9519 starting at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12794 >/dev/null 2>/dev/null selfserv_9519 with PID 12794 found at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 with PID 12794 started at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #1270: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12794 at Tue Nov 8 16:14:32 UTC 2011 kill -USR1 12794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12794 killed at Tue Nov 8 16:14:32 UTC 2011 ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12857 >/dev/null 2>/dev/null selfserv_9519 with PID 12857 found at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 with PID 12857 started at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1271: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12857 at Tue Nov 8 16:14:32 UTC 2011 kill -USR1 12857 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12857 killed at Tue Nov 8 16:14:32 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12920 >/dev/null 2>/dev/null selfserv_9519 with PID 12920 found at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 with PID 12920 started at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1272: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12920 at Tue Nov 8 16:14:32 UTC 2011 kill -USR1 12920 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12920 killed at Tue Nov 8 16:14:32 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12983 >/dev/null 2>/dev/null selfserv_9519 with PID 12983 found at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 with PID 12983 started at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #1273: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12983 at Tue Nov 8 16:14:32 UTC 2011 kill -USR1 12983 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12983 killed at Tue Nov 8 16:14:32 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13046 >/dev/null 2>/dev/null selfserv_9519 with PID 13046 found at Tue Nov 8 16:14:32 UTC 2011 selfserv_9519 with PID 13046 started at Tue Nov 8 16:14:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #1274: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 13046 at Tue Nov 8 16:14:33 UTC 2011 kill -USR1 13046 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13046 killed at Tue Nov 8 16:14:33 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:14:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13109 >/dev/null 2>/dev/null selfserv_9519 with PID 13109 found at Tue Nov 8 16:14:33 UTC 2011 selfserv_9519 with PID 13109 started at Tue Nov 8 16:14:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #1275: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 13109 at Tue Nov 8 16:14:33 UTC 2011 kill -USR1 13109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13109 killed at Tue Nov 8 16:14:33 UTC 2011 ssl.sh: SSL Stress Test - server normal/client fips =============================== ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping 2.0/LGPL 2.1 (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping this file are subject to the Mozilla Public License Version (non-FIPS only) ssl.sh: skipping you may not use this file except in compliance with (non-FIPS only) ssl.sh: skipping may obtain a copy of the License at (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the License is distributed on an "AS IS" basis, (non-FIPS only) ssl.sh: skipping ANY KIND, either express or implied. See the License (non-FIPS only) ssl.sh: skipping language governing rights and limitations under the (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping is the Netscape security libraries. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of the Original Code is (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the Initial Developer are Copyright (C) 1994-2009 (non-FIPS only) ssl.sh: skipping All Rights Reserved. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of this file may be used under the terms of (non-FIPS only) ssl.sh: skipping General Public License Version 2 or later (the "GPL"), or (non-FIPS only) ssl.sh: skipping General Public License Version 2.1 or later (the "LGPL"), (non-FIPS only) ssl.sh: skipping the provisions of the GPL or the LGPL are applicable instead (non-FIPS only) ssl.sh: skipping If you wish to allow use of your version of this file only (non-FIPS only) ssl.sh: skipping of either the GPL or the LGPL, and not to allow others to (non-FIPS only) ssl.sh: skipping of this file under the terms of the MPL, indicate your (non-FIPS only) ssl.sh: skipping the provisions above and replace them with the notice (non-FIPS only) ssl.sh: skipping required by the GPL or the LGPL. If you do not delete# the provisions above, a recipient may use your version of this file under (non-FIPS only) ssl.sh: skipping any one of the MPL, the GPL or the LGPL. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only) ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13388 >/dev/null 2>/dev/null selfserv_9519 with PID 13388 found at Tue Nov 8 16:14:33 UTC 2011 selfserv_9519 with PID 13388 started at Tue Nov 8 16:14:33 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:33 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:14:33 UTC 2011 ssl.sh: #1276: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 13388 at Tue Nov 8 16:14:33 UTC 2011 kill -USR1 13388 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13388 killed at Tue Nov 8 16:14:33 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13463 >/dev/null 2>/dev/null selfserv_9519 with PID 13463 found at Tue Nov 8 16:14:33 UTC 2011 selfserv_9519 with PID 13463 started at Tue Nov 8 16:14:33 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:33 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:14:34 UTC 2011 ssl.sh: #1277: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 13463 at Tue Nov 8 16:14:34 UTC 2011 kill -USR1 13463 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13463 killed at Tue Nov 8 16:14:34 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13538 >/dev/null 2>/dev/null selfserv_9519 with PID 13538 found at Tue Nov 8 16:14:34 UTC 2011 selfserv_9519 with PID 13538 started at Tue Nov 8 16:14:34 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:34 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:34 UTC 2011 ssl.sh: #1278: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 13538 at Tue Nov 8 16:14:34 UTC 2011 kill -USR1 13538 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13538 killed at Tue Nov 8 16:14:34 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13614 >/dev/null 2>/dev/null selfserv_9519 with PID 13614 found at Tue Nov 8 16:14:34 UTC 2011 selfserv_9519 with PID 13614 started at Tue Nov 8 16:14:34 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:34 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:34 UTC 2011 ssl.sh: #1279: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 13614 at Tue Nov 8 16:14:34 UTC 2011 kill -USR1 13614 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13614 killed at Tue Nov 8 16:14:34 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13690 >/dev/null 2>/dev/null selfserv_9519 with PID 13690 found at Tue Nov 8 16:14:34 UTC 2011 selfserv_9519 with PID 13690 started at Tue Nov 8 16:14:34 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:34 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:34 UTC 2011 ssl.sh: #1280: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 13690 at Tue Nov 8 16:14:34 UTC 2011 kill -USR1 13690 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13690 killed at Tue Nov 8 16:14:34 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13766 >/dev/null 2>/dev/null selfserv_9519 with PID 13766 found at Tue Nov 8 16:14:35 UTC 2011 selfserv_9519 with PID 13766 started at Tue Nov 8 16:14:35 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:35 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:35 UTC 2011 ssl.sh: #1281: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 13766 at Tue Nov 8 16:14:35 UTC 2011 kill -USR1 13766 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13766 killed at Tue Nov 8 16:14:35 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13842 >/dev/null 2>/dev/null selfserv_9519 with PID 13842 found at Tue Nov 8 16:14:35 UTC 2011 selfserv_9519 with PID 13842 started at Tue Nov 8 16:14:35 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:35 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:35 UTC 2011 ssl.sh: #1282: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 13842 at Tue Nov 8 16:14:35 UTC 2011 kill -USR1 13842 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13842 killed at Tue Nov 8 16:14:35 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9519 starting at Tue Nov 8 16:14:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13924 >/dev/null 2>/dev/null selfserv_9519 with PID 13924 found at Tue Nov 8 16:14:35 UTC 2011 selfserv_9519 with PID 13924 started at Tue Nov 8 16:14:35 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:35 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:35 UTC 2011 ssl.sh: #1283: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 13924 at Tue Nov 8 16:14:35 UTC 2011 kill -USR1 13924 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13924 killed at Tue Nov 8 16:14:35 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9519 starting at Tue Nov 8 16:14:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14006 >/dev/null 2>/dev/null selfserv_9519 with PID 14006 found at Tue Nov 8 16:14:35 UTC 2011 selfserv_9519 with PID 14006 started at Tue Nov 8 16:14:35 UTC 2011 strsclnt -q -p 9519 -d ../client -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:35 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:14:36 UTC 2011 ssl.sh: #1284: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 14006 at Tue Nov 8 16:14:36 UTC 2011 kill -USR1 14006 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14006 killed at Tue Nov 8 16:14:36 UTC 2011 ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9519 starting at Tue Nov 8 16:14:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:36 UTC 2011 selfserv_9519 with PID 14141 started at Tue Nov 8 16:14:36 UTC 2011 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only) ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only) ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only) ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 14141 >/dev/null 2>/dev/null selfserv_9519 with PID 14141 found at Tue Nov 8 16:14:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 14141 at Tue Nov 8 16:14:39 UTC 2011 kill -USR1 14141 selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14141 killed at Tue Nov 8 16:14:39 UTC 2011 ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15467 >/dev/null 2>/dev/null selfserv_9519 with PID 15467 found at Tue Nov 8 16:14:39 UTC 2011 selfserv_9519 with PID 15467 started at Tue Nov 8 16:14:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1305: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15467 at Tue Nov 8 16:14:39 UTC 2011 kill -USR1 15467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15467 killed at Tue Nov 8 16:14:39 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15524 >/dev/null 2>/dev/null selfserv_9519 with PID 15524 found at Tue Nov 8 16:14:39 UTC 2011 selfserv_9519 with PID 15524 started at Tue Nov 8 16:14:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: write to SSL socket failed: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #1306: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15524 at Tue Nov 8 16:14:40 UTC 2011 kill -USR1 15524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15524 killed at Tue Nov 8 16:14:40 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15581 >/dev/null 2>/dev/null selfserv_9519 with PID 15581 found at Tue Nov 8 16:14:41 UTC 2011 selfserv_9519 with PID 15581 started at Tue Nov 8 16:14:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15581 at Tue Nov 8 16:14:41 UTC 2011 kill -USR1 15581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15581 killed at Tue Nov 8 16:14:41 UTC 2011 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15644 >/dev/null 2>/dev/null selfserv_9519 with PID 15644 found at Tue Nov 8 16:14:41 UTC 2011 selfserv_9519 with PID 15644 started at Tue Nov 8 16:14:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #1308: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15644 at Tue Nov 8 16:14:41 UTC 2011 kill -USR1 15644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15644 killed at Tue Nov 8 16:14:41 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15701 >/dev/null 2>/dev/null selfserv_9519 with PID 15701 found at Tue Nov 8 16:14:41 UTC 2011 selfserv_9519 with PID 15701 started at Tue Nov 8 16:14:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: write to SSL socket failed: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #1309: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15701 at Tue Nov 8 16:14:42 UTC 2011 kill -USR1 15701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15701 killed at Tue Nov 8 16:14:42 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:42 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:42 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15758 >/dev/null 2>/dev/null selfserv_9519 with PID 15758 found at Tue Nov 8 16:14:42 UTC 2011 selfserv_9519 with PID 15758 started at Tue Nov 8 16:14:42 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15758 at Tue Nov 8 16:14:42 UTC 2011 kill -USR1 15758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15758 killed at Tue Nov 8 16:14:42 UTC 2011 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:42 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:42 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15821 >/dev/null 2>/dev/null selfserv_9519 with PID 15821 found at Tue Nov 8 16:14:43 UTC 2011 selfserv_9519 with PID 15821 started at Tue Nov 8 16:14:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1311: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15821 at Tue Nov 8 16:14:43 UTC 2011 kill -USR1 15821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15821 killed at Tue Nov 8 16:14:43 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:43 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15878 >/dev/null 2>/dev/null selfserv_9519 with PID 15878 found at Tue Nov 8 16:14:43 UTC 2011 selfserv_9519 with PID 15878 started at Tue Nov 8 16:14:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: write to SSL socket failed: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #1312: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15878 at Tue Nov 8 16:14:44 UTC 2011 kill -USR1 15878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15878 killed at Tue Nov 8 16:14:44 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:44 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15935 >/dev/null 2>/dev/null selfserv_9519 with PID 15935 found at Tue Nov 8 16:14:44 UTC 2011 selfserv_9519 with PID 15935 started at Tue Nov 8 16:14:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15935 at Tue Nov 8 16:14:44 UTC 2011 kill -USR1 15935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15935 killed at Tue Nov 8 16:14:44 UTC 2011 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:44 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15998 >/dev/null 2>/dev/null selfserv_9519 with PID 15998 found at Tue Nov 8 16:14:44 UTC 2011 selfserv_9519 with PID 15998 started at Tue Nov 8 16:14:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #1314: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15998 at Tue Nov 8 16:14:44 UTC 2011 kill -USR1 15998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15998 killed at Tue Nov 8 16:14:44 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:14:44 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16055 >/dev/null 2>/dev/null selfserv_9519 with PID 16055 found at Tue Nov 8 16:14:44 UTC 2011 selfserv_9519 with PID 16055 started at Tue Nov 8 16:14:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: write to SSL socket failed: Peer's certificate has an invalid signature. tstclnt: exiting with return code 254 ssl.sh: #1315: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16055 at Tue Nov 8 16:14:46 UTC 2011 kill -USR1 16055 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16055 killed at Tue Nov 8 16:14:46 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16112 >/dev/null 2>/dev/null selfserv_9519 with PID 16112 found at Tue Nov 8 16:14:46 UTC 2011 selfserv_9519 with PID 16112 started at Tue Nov 8 16:14:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16112 at Tue Nov 8 16:14:46 UTC 2011 kill -USR1 16112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16112 killed at Tue Nov 8 16:14:46 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server normal/client fips =============================== ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping 2.0/LGPL 2.1 (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping this file are subject to the Mozilla Public License Version (non-FIPS only) ssl.sh: skipping you may not use this file except in compliance with (non-FIPS only) ssl.sh: skipping may obtain a copy of the License at (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the License is distributed on an "AS IS" basis, (non-FIPS only) ssl.sh: skipping ANY KIND, either express or implied. See the License (non-FIPS only) ssl.sh: skipping language governing rights and limitations under the (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping is the Netscape security libraries. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of the Original Code is (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the Initial Developer are Copyright (C) 1994-2009 (non-FIPS only) ssl.sh: skipping All Rights Reserved. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping of this file may be used under the terms of (non-FIPS only) ssl.sh: skipping General Public License Version 2 or later (the "GPL"), or (non-FIPS only) ssl.sh: skipping General Public License Version 2.1 or later (the "LGPL"), (non-FIPS only) ssl.sh: skipping the provisions of the GPL or the LGPL are applicable instead (non-FIPS only) ssl.sh: skipping If you wish to allow use of your version of this file only (non-FIPS only) ssl.sh: skipping of either the GPL or the LGPL, and not to allow others to (non-FIPS only) ssl.sh: skipping of this file under the terms of the MPL, indicate your (non-FIPS only) ssl.sh: skipping the provisions above and replace them with the notice (non-FIPS only) ssl.sh: skipping required by the GPL or the LGPL. If you do not delete# the provisions above, a recipient may use your version of this file under (non-FIPS only) ssl.sh: skipping any one of the MPL, the GPL or the LGPL. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping BLOCK ***** (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping the stress tests for SSL/TLS. (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping client Test Case name (non-FIPS only) ssl.sh: skipping params (non-FIPS only) ssl.sh: skipping ------ --------------- (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: skipping Stress SSL3 RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only) ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16472 >/dev/null 2>/dev/null selfserv_9519 with PID 16472 found at Tue Nov 8 16:14:46 UTC 2011 selfserv_9519 with PID 16472 started at Tue Nov 8 16:14:46 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:46 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:14:47 UTC 2011 ssl.sh: #1317: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16472 at Tue Nov 8 16:14:47 UTC 2011 kill -USR1 16472 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16472 killed at Tue Nov 8 16:14:47 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:47 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16553 >/dev/null 2>/dev/null selfserv_9519 with PID 16553 found at Tue Nov 8 16:14:47 UTC 2011 selfserv_9519 with PID 16553 started at Tue Nov 8 16:14:47 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:47 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:14:47 UTC 2011 ssl.sh: #1318: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16553 at Tue Nov 8 16:14:47 UTC 2011 kill -USR1 16553 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16553 killed at Tue Nov 8 16:14:47 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:47 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16628 >/dev/null 2>/dev/null selfserv_9519 with PID 16628 found at Tue Nov 8 16:14:47 UTC 2011 selfserv_9519 with PID 16628 started at Tue Nov 8 16:14:47 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:47 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:48 UTC 2011 ssl.sh: #1319: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16628 at Tue Nov 8 16:14:48 UTC 2011 kill -USR1 16628 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16628 killed at Tue Nov 8 16:14:48 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16704 >/dev/null 2>/dev/null selfserv_9519 with PID 16704 found at Tue Nov 8 16:14:48 UTC 2011 selfserv_9519 with PID 16704 started at Tue Nov 8 16:14:48 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:48 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:48 UTC 2011 ssl.sh: #1320: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16704 at Tue Nov 8 16:14:48 UTC 2011 kill -USR1 16704 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16704 killed at Tue Nov 8 16:14:48 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16780 >/dev/null 2>/dev/null selfserv_9519 with PID 16780 found at Tue Nov 8 16:14:48 UTC 2011 selfserv_9519 with PID 16780 started at Tue Nov 8 16:14:48 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:48 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:14:48 UTC 2011 ssl.sh: #1321: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16780 at Tue Nov 8 16:14:48 UTC 2011 kill -USR1 16780 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16780 killed at Tue Nov 8 16:14:48 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:14:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16856 >/dev/null 2>/dev/null selfserv_9519 with PID 16856 found at Tue Nov 8 16:14:48 UTC 2011 selfserv_9519 with PID 16856 started at Tue Nov 8 16:14:48 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:48 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:48 UTC 2011 ssl.sh: #1322: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16856 at Tue Nov 8 16:14:48 UTC 2011 kill -USR1 16856 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16856 killed at Tue Nov 8 16:14:48 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:14:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:14:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16936 >/dev/null 2>/dev/null selfserv_9519 with PID 16936 found at Tue Nov 8 16:14:49 UTC 2011 selfserv_9519 with PID 16936 started at Tue Nov 8 16:14:49 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:14:49 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:14:49 UTC 2011 ssl.sh: #1323: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16936 at Tue Nov 8 16:14:49 UTC 2011 kill -USR1 16936 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16936 killed at Tue Nov 8 16:14:49 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping (non-FIPS only) ssl.sh: skipping ############################ (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping versions here... (non-FIPS only) ssl.sh: skipping (non-FIPS only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1324: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/ext_client -list ssl.sh: #1325: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1326: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Tue Nov 8 16:14:49 UTC 2011 Running tests for ocsp TIMESTAMP ocsp BEGIN: Tue Nov 8 16:14:49 UTC 2011 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Tue Nov 8 16:14:49 UTC 2011 Running tests for merge TIMESTAMP merge BEGIN: Tue Nov 8 16:14:49 UTC 2011 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.v3.18966 -t Test2 -f ../tests.pw merge.sh: #1327: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1328: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1329: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1330: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1331: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1332: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:12:05 2011 Not After : Tue Nov 08 16:12:05 2016 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:e2:f7:ed:b6:a5:02:29:26:96:c3:29:52:a9:e8:3a: a3:fb:1e:29:ad:99:60:ea:eb:1a:9a:f5:90:7b:f7:e5: 0f:ca:4f:a8:36:98:dc:95:ca:fe:0b:4f:1c:10:0f:6d: 9f:85:5a:ac:ac:0b:70:98:91:75:75:f7:dd:fc:d9:ae: 46:a8:c1:46:fa:4f:a5:aa:9a:4f:2e:ea:20:84:ec:0a: 33:71:1a:8d:f6:fa:73:58:46:67:48:86:db:52:61:78: 08:06:00:6f:bb:d5:77:c9:dd:80:a5:d9:ce:6a:e8:13: 3f:a9:90:60:fb:29:00:90:f8:b0:cb:2a:c2:21:5d:91 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0f:b9:49:f7:3a:38:ed:f4:50:00:7a:b8:15:4e:1d:97: 35:17:24:c3:94:aa:19:c8:aa:63:44:bc:13:95:6c:f2: a0:ce:18:c3:c5:1e:9e:d8:3b:7b:93:a3:7e:7d:00:b0: eb:37:0d:5d:3f:72:a9:35:ca:35:62:f7:7a:65:fb:2f: b7:78:d0:df:7d:17:b8:6f:75:94:fa:a8:9e:0b:db:f8: 07:46:ec:11:23:5f:70:69:1f:03:14:f6:3e:cb:e7:64: 52:18:dc:7f:c2:e9:e8:23:11:c6:6a:ea:51:12:d9:eb: c1:aa:53:78:0f:ae:d0:e4:a9:ba:b5:d6:d2:6b:79:2d Fingerprint (MD5): 0E:3D:C6:E8:62:AC:8A:13:3E:14:2F:31:23:8E:94:0B Fingerprint (SHA1): A3:F2:AB:CA:1D:7C:A2:E8:75:07:8A:A5:F3:D1:EF:66:E4:2A:8D:07 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #1333: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:12:05 2011 Not After : Tue Nov 08 16:12:05 2016 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:e6:5c:16:bd:fd:d4:22:43:17:74:76:a7:75:d1:ff: d7:ee:97:ef:d7:2a:68:a0:39:92:c7:f7:ed:6b:8b:96: 7f:86:6f:3a:a7:1c:13:ae:14:2e:2a:53:a8:b6:74:bf: 91:b8:9a:a2:90:48:97:10:84:63:a5:ff:6a:85:2b:f2: 7e:f4:86:6e:da:90:53:28:f9:f5:d2:cd:fb:fa:20:ea: 13:9c:c4:44:4a:0c:99:83:41:4e:82:d4:a6:e9:bd:75: 58:0e:e2:76:c6:f9:ad:f7:25:63:7d:c4:44:c4:56:b7: 0c:01:ec:d0:de:b9:5f:80:80:6c:75:d6:97:9d:29:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b4:ff:70:74:99:35:f3:ef:8c:b0:9c:9b:51:70:84:9b: 45:6a:df:9e:85:65:4f:3a:ce:86:c9:8e:e6:48:ab:12: dd:d7:4e:41:b0:81:b3:27:70:ac:b2:ea:55:2a:58:14: d9:ce:1f:83:18:08:b3:4d:0f:70:f9:fc:da:a5:fb:f8: b2:13:0f:df:71:c1:e1:87:2a:44:9c:d8:00:98:7d:75: e3:4d:8a:0f:76:4b:01:5f:f0:fa:92:be:30:f5:7e:6b: aa:aa:0f:8e:4d:bb:42:34:bd:4b:13:64:55:52:c3:8a: 94:27:7d:a8:c1:08:ce:22:71:6d:c5:41:87:2b:5d:38 Fingerprint (MD5): 6B:93:32:46:C7:A7:CC:B1:D2:7C:5E:1F:0E:AC:52:92 Fingerprint (SHA1): 20:2C:C6:62:31:15:0D:4B:48:5A:E8:C2:74:B3:71:FF:DD:F4:C4:24 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #1334: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #1335: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Alice u,u,u bob@bogus.com ,, eve@bogus.com ,, Dave u,u,u localhost.localdomain u,u,u clientCA T,C,C chain-2-clientCA ,, Alice #1 ,, Alice #3 ,, Alice #100 ,, TestCA CT,C,C localhost-sni.localdomain u,u,u ExtendedSSLUser u,u,u serverCA C,C,C chain-1-clientCA ,, Alice #2 ,, Alice #99 ,, Alice #4 ,, CRL names CRL Type TestCA CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.v3.18966 -t Test2 -f ../tests.pw merge.sh: #1336: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests.v1.18966 -t Test1 -f ../tests.pw merge.sh: #1337: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #1338: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #1339: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #1340: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Tue Nov 08 16:12:11 2011 Entry (1): Serial Number: 40 (0x28) Revocation Date: Tue Nov 08 16:11:53 2011 Entry Extensions: Name: CRL reason code Entry (2): Serial Number: 42 (0x2a) Revocation Date: Tue Nov 08 16:12:09 2011 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #1341: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Tue Nov 8 16:14:49 UTC 2011 Running tests for pkits TIMESTAMP pkits BEGIN: Tue Nov 8 16:14:49 UTC 2011 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Tue Nov 8 16:14:49 UTC 2011 Running tests for chains TIMESTAMP chains BEGIN: Tue Nov 8 16:14:49 UTC 2011 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1342: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161450 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1343: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1344: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1345: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161451 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1346: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1347: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1348: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1349: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1108161452 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1350: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #1351: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1108161453 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1352: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #1353: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1354: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1355: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1356: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1108161454 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1357: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der chains.sh: #1358: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1359: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1360: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1361: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161451 (0x420d33ab) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:14:50 2011 Not After : Tue Nov 08 16:14:50 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:66:96:f1:73:0c:f2:0b:95:09:8a:d8:3a:db:f9:8b: 82:8b:de:b8:92:f9:99:cd:43:4d:45:22:9a:35:43:1e: e9:7b:90:76:25:c6:65:60:7e:de:5b:9f:ed:31:de:d0: 36:c1:ce:8b:51:8b:8a:ec:f9:f3:dc:49:79:29:5f:3c: fe:44:a9:60:3e:06:02:72:3d:d9:2c:4a:49:db:5a:f5: 29:b1:3f:5c:2d:bc:5a:c7:97:d0:f9:7d:4e:ce:3e:90: c0:16:c0:d1:d5:70:e5:fe:a3:54:46:ad:0c:3c:6b:db: c8:19:93:fe:01:66:18:6f:4b:1d:3c:3a:1b:70:9c:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:0e:aa:46:8b:8c:ee:a3:69:16:fe:79:67:7a:50:f1: 4e:de:8b:fa:ac:b8:1f:61:b5:ca:8f:55:e1:ce:66:bc: 95:0d:f3:83:85:ca:60:6e:11:8c:e1:2e:56:44:7a:ff: 87:8d:1a:d7:9f:1a:07:47:25:bd:91:6e:80:43:2b:8c: bb:c2:2b:eb:1a:da:b4:46:65:6b:ea:f9:c2:c8:d1:de: 95:fa:0f:37:b2:7f:47:39:2b:bf:bf:f5:09:cf:1d:7e: 91:96:36:4a:cc:a1:0a:38:30:57:d5:45:67:db:d4:29: 86:22:74:fc:fb:d3:24:13:48:34:ef:3a:1a:d8:8b:b2 Fingerprint (MD5): A6:03:98:46:EF:C5:22:26:5B:E1:45:FC:F3:DA:93:2C Fingerprint (SHA1): 72:E1:FA:54:06:37:7B:A4:29:35:88:1C:45:54:BF:8D:F1:D7:E2:00 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1362: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161450 (0x420d33aa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:14:50 2011 Not After : Tue Nov 08 16:14:50 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:06:b1:ca:33:32:be:71:a9:1b:bf:ba:6a:20:17:4e: 8f:56:fb:5f:c7:e1:6a:af:1e:77:2b:a3:2a:87:60:d7: 25:47:40:f9:9b:71:29:9f:c0:0c:6e:0e:f3:e8:43:02: 1a:68:dd:9a:9a:a1:78:05:8b:61:1d:49:79:47:17:54: e2:e2:72:ac:ee:27:30:00:80:b4:e1:f0:de:28:2c:fa: b7:5f:63:57:d2:24:7d:af:2b:85:fa:ac:32:d0:13:d9: 9c:af:62:3b:ca:f5:2f:2f:a2:f6:11:4d:bd:5c:44:e7: 9c:9d:9b:9c:53:f1:27:39:39:1c:13:e0:1b:3a:45:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d5:ed:c1:70:62:1e:84:3b:19:88:9e:17:30:35:fe:23: 3b:bc:34:44:51:a5:8b:d1:70:cc:78:d0:29:83:8c:67: 40:bb:8c:04:fc:96:88:c5:df:0f:b8:64:b4:1c:d3:e8: 29:ca:62:5c:8f:2e:9a:2c:fc:20:17:e7:b8:5a:cb:ae: 12:30:4c:b1:9a:c8:2b:02:1b:15:2e:d4:45:8c:eb:4a: 2b:f2:2b:79:7c:3c:4c:03:06:a9:83:8b:5d:a0:f3:98: c8:c4:fa:ec:96:1b:66:a3:b4:01:70:24:80:fa:61:d3: 8c:cc:e3:77:57:c4:3a:a9:1b:b2:a1:1b:a0:ec:32:f2 Fingerprint (MD5): E2:2E:C4:80:81:1F:CC:3F:25:38:00:0D:13:C5:6D:F2 Fingerprint (SHA1): 3E:53:5B:AA:38:8D:68:36:87:23:EF:AE:FD:6E:61:D3:9A:0F:DE:25 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1363: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1364: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1365: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1366: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161450 (0x420d33aa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:14:50 2011 Not After : Tue Nov 08 16:14:50 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:06:b1:ca:33:32:be:71:a9:1b:bf:ba:6a:20:17:4e: 8f:56:fb:5f:c7:e1:6a:af:1e:77:2b:a3:2a:87:60:d7: 25:47:40:f9:9b:71:29:9f:c0:0c:6e:0e:f3:e8:43:02: 1a:68:dd:9a:9a:a1:78:05:8b:61:1d:49:79:47:17:54: e2:e2:72:ac:ee:27:30:00:80:b4:e1:f0:de:28:2c:fa: b7:5f:63:57:d2:24:7d:af:2b:85:fa:ac:32:d0:13:d9: 9c:af:62:3b:ca:f5:2f:2f:a2:f6:11:4d:bd:5c:44:e7: 9c:9d:9b:9c:53:f1:27:39:39:1c:13:e0:1b:3a:45:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d5:ed:c1:70:62:1e:84:3b:19:88:9e:17:30:35:fe:23: 3b:bc:34:44:51:a5:8b:d1:70:cc:78:d0:29:83:8c:67: 40:bb:8c:04:fc:96:88:c5:df:0f:b8:64:b4:1c:d3:e8: 29:ca:62:5c:8f:2e:9a:2c:fc:20:17:e7:b8:5a:cb:ae: 12:30:4c:b1:9a:c8:2b:02:1b:15:2e:d4:45:8c:eb:4a: 2b:f2:2b:79:7c:3c:4c:03:06:a9:83:8b:5d:a0:f3:98: c8:c4:fa:ec:96:1b:66:a3:b4:01:70:24:80:fa:61:d3: 8c:cc:e3:77:57:c4:3a:a9:1b:b2:a1:1b:a0:ec:32:f2 Fingerprint (MD5): E2:2E:C4:80:81:1F:CC:3F:25:38:00:0D:13:C5:6D:F2 Fingerprint (SHA1): 3E:53:5B:AA:38:8D:68:36:87:23:EF:AE:FD:6E:61:D3:9A:0F:DE:25 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1367: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161451 (0x420d33ab) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:14:50 2011 Not After : Tue Nov 08 16:14:50 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:66:96:f1:73:0c:f2:0b:95:09:8a:d8:3a:db:f9:8b: 82:8b:de:b8:92:f9:99:cd:43:4d:45:22:9a:35:43:1e: e9:7b:90:76:25:c6:65:60:7e:de:5b:9f:ed:31:de:d0: 36:c1:ce:8b:51:8b:8a:ec:f9:f3:dc:49:79:29:5f:3c: fe:44:a9:60:3e:06:02:72:3d:d9:2c:4a:49:db:5a:f5: 29:b1:3f:5c:2d:bc:5a:c7:97:d0:f9:7d:4e:ce:3e:90: c0:16:c0:d1:d5:70:e5:fe:a3:54:46:ad:0c:3c:6b:db: c8:19:93:fe:01:66:18:6f:4b:1d:3c:3a:1b:70:9c:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:0e:aa:46:8b:8c:ee:a3:69:16:fe:79:67:7a:50:f1: 4e:de:8b:fa:ac:b8:1f:61:b5:ca:8f:55:e1:ce:66:bc: 95:0d:f3:83:85:ca:60:6e:11:8c:e1:2e:56:44:7a:ff: 87:8d:1a:d7:9f:1a:07:47:25:bd:91:6e:80:43:2b:8c: bb:c2:2b:eb:1a:da:b4:46:65:6b:ea:f9:c2:c8:d1:de: 95:fa:0f:37:b2:7f:47:39:2b:bf:bf:f5:09:cf:1d:7e: 91:96:36:4a:cc:a1:0a:38:30:57:d5:45:67:db:d4:29: 86:22:74:fc:fb:d3:24:13:48:34:ef:3a:1a:d8:8b:b2 Fingerprint (MD5): A6:03:98:46:EF:C5:22:26:5B:E1:45:FC:F3:DA:93:2C Fingerprint (SHA1): 72:E1:FA:54:06:37:7B:A4:29:35:88:1C:45:54:BF:8D:F1:D7:E2:00 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1368: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1369: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1370: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1371: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1372: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1373: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161451 (0x420d33ab) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:14:50 2011 Not After : Tue Nov 08 16:14:50 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:66:96:f1:73:0c:f2:0b:95:09:8a:d8:3a:db:f9:8b: 82:8b:de:b8:92:f9:99:cd:43:4d:45:22:9a:35:43:1e: e9:7b:90:76:25:c6:65:60:7e:de:5b:9f:ed:31:de:d0: 36:c1:ce:8b:51:8b:8a:ec:f9:f3:dc:49:79:29:5f:3c: fe:44:a9:60:3e:06:02:72:3d:d9:2c:4a:49:db:5a:f5: 29:b1:3f:5c:2d:bc:5a:c7:97:d0:f9:7d:4e:ce:3e:90: c0:16:c0:d1:d5:70:e5:fe:a3:54:46:ad:0c:3c:6b:db: c8:19:93:fe:01:66:18:6f:4b:1d:3c:3a:1b:70:9c:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:0e:aa:46:8b:8c:ee:a3:69:16:fe:79:67:7a:50:f1: 4e:de:8b:fa:ac:b8:1f:61:b5:ca:8f:55:e1:ce:66:bc: 95:0d:f3:83:85:ca:60:6e:11:8c:e1:2e:56:44:7a:ff: 87:8d:1a:d7:9f:1a:07:47:25:bd:91:6e:80:43:2b:8c: bb:c2:2b:eb:1a:da:b4:46:65:6b:ea:f9:c2:c8:d1:de: 95:fa:0f:37:b2:7f:47:39:2b:bf:bf:f5:09:cf:1d:7e: 91:96:36:4a:cc:a1:0a:38:30:57:d5:45:67:db:d4:29: 86:22:74:fc:fb:d3:24:13:48:34:ef:3a:1a:d8:8b:b2 Fingerprint (MD5): A6:03:98:46:EF:C5:22:26:5B:E1:45:FC:F3:DA:93:2C Fingerprint (SHA1): 72:E1:FA:54:06:37:7B:A4:29:35:88:1C:45:54:BF:8D:F1:D7:E2:00 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1374: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161451 (0x420d33ab) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:14:50 2011 Not After : Tue Nov 08 16:14:50 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:66:96:f1:73:0c:f2:0b:95:09:8a:d8:3a:db:f9:8b: 82:8b:de:b8:92:f9:99:cd:43:4d:45:22:9a:35:43:1e: e9:7b:90:76:25:c6:65:60:7e:de:5b:9f:ed:31:de:d0: 36:c1:ce:8b:51:8b:8a:ec:f9:f3:dc:49:79:29:5f:3c: fe:44:a9:60:3e:06:02:72:3d:d9:2c:4a:49:db:5a:f5: 29:b1:3f:5c:2d:bc:5a:c7:97:d0:f9:7d:4e:ce:3e:90: c0:16:c0:d1:d5:70:e5:fe:a3:54:46:ad:0c:3c:6b:db: c8:19:93:fe:01:66:18:6f:4b:1d:3c:3a:1b:70:9c:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:0e:aa:46:8b:8c:ee:a3:69:16:fe:79:67:7a:50:f1: 4e:de:8b:fa:ac:b8:1f:61:b5:ca:8f:55:e1:ce:66:bc: 95:0d:f3:83:85:ca:60:6e:11:8c:e1:2e:56:44:7a:ff: 87:8d:1a:d7:9f:1a:07:47:25:bd:91:6e:80:43:2b:8c: bb:c2:2b:eb:1a:da:b4:46:65:6b:ea:f9:c2:c8:d1:de: 95:fa:0f:37:b2:7f:47:39:2b:bf:bf:f5:09:cf:1d:7e: 91:96:36:4a:cc:a1:0a:38:30:57:d5:45:67:db:d4:29: 86:22:74:fc:fb:d3:24:13:48:34:ef:3a:1a:d8:8b:b2 Fingerprint (MD5): A6:03:98:46:EF:C5:22:26:5B:E1:45:FC:F3:DA:93:2C Fingerprint (SHA1): 72:E1:FA:54:06:37:7B:A4:29:35:88:1C:45:54:BF:8D:F1:D7:E2:00 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1375: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1376: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1377: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1378: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1379: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1380: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161450 (0x420d33aa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:14:50 2011 Not After : Tue Nov 08 16:14:50 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:06:b1:ca:33:32:be:71:a9:1b:bf:ba:6a:20:17:4e: 8f:56:fb:5f:c7:e1:6a:af:1e:77:2b:a3:2a:87:60:d7: 25:47:40:f9:9b:71:29:9f:c0:0c:6e:0e:f3:e8:43:02: 1a:68:dd:9a:9a:a1:78:05:8b:61:1d:49:79:47:17:54: e2:e2:72:ac:ee:27:30:00:80:b4:e1:f0:de:28:2c:fa: b7:5f:63:57:d2:24:7d:af:2b:85:fa:ac:32:d0:13:d9: 9c:af:62:3b:ca:f5:2f:2f:a2:f6:11:4d:bd:5c:44:e7: 9c:9d:9b:9c:53:f1:27:39:39:1c:13:e0:1b:3a:45:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d5:ed:c1:70:62:1e:84:3b:19:88:9e:17:30:35:fe:23: 3b:bc:34:44:51:a5:8b:d1:70:cc:78:d0:29:83:8c:67: 40:bb:8c:04:fc:96:88:c5:df:0f:b8:64:b4:1c:d3:e8: 29:ca:62:5c:8f:2e:9a:2c:fc:20:17:e7:b8:5a:cb:ae: 12:30:4c:b1:9a:c8:2b:02:1b:15:2e:d4:45:8c:eb:4a: 2b:f2:2b:79:7c:3c:4c:03:06:a9:83:8b:5d:a0:f3:98: c8:c4:fa:ec:96:1b:66:a3:b4:01:70:24:80:fa:61:d3: 8c:cc:e3:77:57:c4:3a:a9:1b:b2:a1:1b:a0:ec:32:f2 Fingerprint (MD5): E2:2E:C4:80:81:1F:CC:3F:25:38:00:0D:13:C5:6D:F2 Fingerprint (SHA1): 3E:53:5B:AA:38:8D:68:36:87:23:EF:AE:FD:6E:61:D3:9A:0F:DE:25 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1381: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161450 (0x420d33aa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:14:50 2011 Not After : Tue Nov 08 16:14:50 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:06:b1:ca:33:32:be:71:a9:1b:bf:ba:6a:20:17:4e: 8f:56:fb:5f:c7:e1:6a:af:1e:77:2b:a3:2a:87:60:d7: 25:47:40:f9:9b:71:29:9f:c0:0c:6e:0e:f3:e8:43:02: 1a:68:dd:9a:9a:a1:78:05:8b:61:1d:49:79:47:17:54: e2:e2:72:ac:ee:27:30:00:80:b4:e1:f0:de:28:2c:fa: b7:5f:63:57:d2:24:7d:af:2b:85:fa:ac:32:d0:13:d9: 9c:af:62:3b:ca:f5:2f:2f:a2:f6:11:4d:bd:5c:44:e7: 9c:9d:9b:9c:53:f1:27:39:39:1c:13:e0:1b:3a:45:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d5:ed:c1:70:62:1e:84:3b:19:88:9e:17:30:35:fe:23: 3b:bc:34:44:51:a5:8b:d1:70:cc:78:d0:29:83:8c:67: 40:bb:8c:04:fc:96:88:c5:df:0f:b8:64:b4:1c:d3:e8: 29:ca:62:5c:8f:2e:9a:2c:fc:20:17:e7:b8:5a:cb:ae: 12:30:4c:b1:9a:c8:2b:02:1b:15:2e:d4:45:8c:eb:4a: 2b:f2:2b:79:7c:3c:4c:03:06:a9:83:8b:5d:a0:f3:98: c8:c4:fa:ec:96:1b:66:a3:b4:01:70:24:80:fa:61:d3: 8c:cc:e3:77:57:c4:3a:a9:1b:b2:a1:1b:a0:ec:32:f2 Fingerprint (MD5): E2:2E:C4:80:81:1F:CC:3F:25:38:00:0D:13:C5:6D:F2 Fingerprint (SHA1): 3E:53:5B:AA:38:8D:68:36:87:23:EF:AE:FD:6E:61:D3:9A:0F:DE:25 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1382: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1383: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161455 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1384: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1385: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1386: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161456 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1387: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1388: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1389: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161457 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1390: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1391: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1392: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161458 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1393: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1394: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1395: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161459 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1396: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1397: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1398: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161460 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1399: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1400: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1401: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161461 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1402: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1403: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1404: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161462 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1405: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1406: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1407: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161463 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1408: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1409: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1410: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1411: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1108161464 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1412: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der chains.sh: #1413: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1108161465 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1414: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der chains.sh: #1415: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1108161466 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1416: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der chains.sh: #1417: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1418: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1419: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1420: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1108161467 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1421: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der chains.sh: #1422: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1108161468 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1423: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der chains.sh: #1424: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1108161469 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1425: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der chains.sh: #1426: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1427: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1428: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1429: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1108161470 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1430: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der chains.sh: #1431: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1108161471 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1432: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der chains.sh: #1433: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1108161472 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1434: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der chains.sh: #1435: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1436: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1437: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1438: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1108161473 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1439: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der chains.sh: #1440: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1108161474 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1441: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der chains.sh: #1442: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1108161475 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1443: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der chains.sh: #1444: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1445: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1446: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1447: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1108161476 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1448: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der chains.sh: #1449: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1450: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1451: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161477 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1452: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1453: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161455 (0x420d33af) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Tue Nov 08 16:14:52 2011 Not After : Tue Nov 08 16:14:52 2061 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:04:ae:f2:b5:23:e7:d5:90:66:50:e1:5b:ca:b2:89: 96:7b:9b:7a:33:6c:02:d4:24:a4:c0:55:ef:55:ae:d1: 60:8d:7e:4c:8e:f3:05:07:a2:35:7a:20:0d:38:c9:e7: da:da:d8:27:0b:be:de:a4:d3:31:59:45:36:cc:98:14: 3b:73:3a:1a:3a:5a:20:ef:48:d6:64:69:52:c8:86:c6: dd:ea:e7:9e:d4:83:fa:08:f8:b3:a8:dc:66:5b:ed:b5: b0:7e:bc:ea:9a:14:c0:8c:c5:14:96:c6:6d:fe:fa:a3: b2:04:62:54:8f:0d:00:df:8c:0c:34:a7:fe:5c:e9:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 56:d3:7b:ab:b1:be:e6:83:94:28:f5:47:e7:91:e6:04: 28:8e:7d:f0:a9:4c:9d:9f:01:60:95:df:7d:79:8f:ae: 55:17:9f:84:f9:df:6e:bd:25:5f:fc:e3:66:6a:88:a3: b1:f7:0b:e1:ee:25:1c:4a:5f:da:0f:41:c3:2f:50:ab: fe:ed:fc:33:23:5f:5c:c2:01:2c:eb:ec:33:37:d7:c1: 98:a0:65:d0:ca:f4:f8:45:1a:5c:a8:d9:bb:b1:13:f8: d0:4b:ff:9a:11:9c:72:c6:29:f5:9a:09:ab:86:c4:1a: b2:24:c8:bb:cf:f8:96:20:c8:5b:b9:3f:95:8d:1b:af Fingerprint (MD5): 99:45:2E:C3:8F:B7:A5:41:6F:F4:5F:28:4E:5D:C9:F1 Fingerprint (SHA1): 0F:F3:7B:64:30:8B:79:14:7D:1A:F0:7C:97:30:8C:BC:53:90:5C:71 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1454: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161456 (0x420d33b0) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Tue Nov 08 16:14:53 2011 Not After : Tue Nov 08 16:14:53 2061 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:62:57:57:3b:fb:a1:c7:9d:50:a0:10:e7:08:c2:1d: 59:d9:03:73:30:0a:a8:43:c0:f8:30:8f:45:9a:77:07: 70:18:5a:17:fb:57:3e:51:36:92:e5:1d:4d:96:e8:5d: 22:42:3e:5e:41:76:76:02:c0:35:87:7d:d6:ba:da:45: 95:57:9b:4f:0b:c3:69:36:a5:04:aa:29:0d:fa:e3:19: 7b:fc:a3:e7:06:7c:71:7c:87:62:89:b0:39:3b:11:c1: e0:72:f9:9c:52:f1:fe:65:40:90:12:38:24:eb:d1:eb: 51:00:14:de:1a:5a:ab:5b:8c:7c:69:54:a2:7a:3e:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7f:6c:23:c1:a9:4a:67:d1:ab:7e:43:f9:8e:f5:87:b9: 3c:03:d8:0f:50:11:ae:a8:f2:4c:36:4f:d4:bc:1c:e2: 12:a3:b1:2c:71:84:01:91:19:82:a3:58:9b:9c:62:39: ca:98:35:81:0d:62:eb:9c:8f:1d:8b:9a:27:75:52:b7: 94:f8:de:4f:37:a7:75:7b:54:ec:38:ba:62:fc:8f:02: 5c:68:e1:c4:b0:f8:4f:a0:9a:8b:5c:ae:d2:9e:be:e4: 1d:7c:d2:29:49:c7:f3:31:44:9d:8e:e4:13:95:59:76: c2:3f:97:d3:a7:07:15:51:b0:03:57:18:24:85:11:dc Fingerprint (MD5): 87:0E:F9:04:C7:D5:B1:69:6F:8D:2C:D8:90:A7:CF:66 Fingerprint (SHA1): 2B:42:BE:38:0B:2D:72:55:28:DA:20:40:A9:F9:37:EC:E1:B1:5F:4B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1455: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161457 (0x420d33b1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Tue Nov 08 16:14:53 2011 Not After : Tue Nov 08 16:14:53 2061 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:a1:f0:a1:a3:3b:82:fc:db:47:5f:ae:b3:ee:7f:f0: 0e:1a:c7:6a:91:dc:12:03:f2:10:23:2d:73:d6:e3:6a: 7a:9b:ee:b3:4e:c6:87:ef:3e:fe:fc:39:e7:9f:2a:31: a0:06:09:60:52:06:67:68:0f:92:fb:c9:81:a3:43:fd: d4:37:c2:6e:31:11:f7:99:e8:14:81:b7:90:9e:95:6a: fc:81:ad:2f:d3:aa:b5:ed:b8:1c:0e:05:e7:58:3b:4e: 00:9b:44:7f:d2:68:6f:1f:17:a2:f4:ce:ab:e6:b9:9d: c8:5a:99:d5:65:38:b6:68:af:79:76:7e:1f:00:79:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 37:e9:42:0c:78:12:b2:ff:d5:b9:f8:a2:77:99:3f:1c: 94:9e:0e:e0:ca:b7:3a:9e:e6:b9:c6:31:a2:49:39:d4: 54:94:04:03:40:b8:5d:42:63:ea:ab:89:46:2d:25:a8: cf:48:9d:6a:4b:00:83:8e:35:f2:0f:15:0e:60:26:46: 9a:b6:f0:88:c0:b3:a2:08:c3:7c:22:81:ff:67:7f:82: 31:ab:24:b0:a1:77:8d:1b:32:ad:c4:e6:95:4c:99:0b: 17:b2:91:e3:66:d1:3d:fa:aa:81:20:9d:32:de:80:e7: 6b:ba:85:ea:78:59:9a:7f:54:d0:a0:39:16:39:d0:35 Fingerprint (MD5): D6:38:4E:5F:A3:43:95:6A:EA:AE:0C:C5:F2:3C:C3:69 Fingerprint (SHA1): C9:BE:26:64:7C:71:6D:D3:22:8C:DE:F0:C7:CC:24:8F:65:B9:34:EB Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1456: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161458 (0x420d33b2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Tue Nov 08 16:14:53 2011 Not After : Tue Nov 08 16:14:53 2061 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:4b:8e:17:d6:25:01:b1:74:1a:68:e1:c2:a5:f3:92: 0d:26:60:03:aa:b6:6a:1d:c0:ce:32:d7:2c:7a:64:6a: 46:30:e9:b9:52:27:4b:1a:5a:07:31:99:c1:25:ac:3a: 72:b6:71:bd:c2:20:ce:fc:e8:6c:c9:1d:fc:4d:a5:9f: 4b:db:b7:68:9d:f3:da:57:5e:8e:ec:2c:87:1b:63:e9: 09:61:b2:21:8c:50:b4:74:20:8f:72:fd:70:56:77:b5: 8e:1d:a3:d1:bb:14:83:26:5d:ff:38:00:a6:5d:13:4f: 4d:e1:e0:88:b9:e7:3b:ec:2f:de:5e:44:99:9b:73:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 46:58:3f:db:5d:13:4b:2a:c1:1b:28:34:c2:38:26:4c: 3a:3f:a5:f8:f3:7a:9b:9b:76:aa:25:0e:0c:8e:4d:9a: 2d:7c:19:ef:29:2c:36:ee:3e:86:6d:d6:77:bf:57:b5: ab:48:67:72:b3:f0:81:c2:a6:96:3b:32:0a:3c:ee:2c: 90:77:6c:06:ad:27:ba:3a:75:e9:63:db:d9:ba:37:33: 38:ef:ef:2b:51:7d:80:8b:24:fe:45:52:c9:80:55:de: b0:05:19:f8:d5:0e:cc:69:6d:2a:87:ac:02:89:01:eb: 45:31:63:08:6b:31:51:4c:83:59:76:78:19:ae:6b:6c Fingerprint (MD5): 04:A0:AA:01:8F:89:38:A2:0E:6F:6F:7B:84:5D:E2:EE Fingerprint (SHA1): 03:8F:39:7F:A7:ED:40:D1:EE:F0:85:21:6D:2B:EC:EC:97:A9:51:E0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1457: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161459 (0x420d33b3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Tue Nov 08 16:14:53 2011 Not After : Tue Nov 08 16:14:53 2061 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:4a:96:75:15:82:1f:7c:1f:1b:cf:d9:78:4b:21:f7: c2:6d:46:fb:98:84:cb:5c:ab:d6:01:9a:60:97:d5:05: b8:ae:3f:41:b6:d2:2e:1c:89:f7:84:0c:6c:5c:6c:0c: 2e:af:5b:97:ac:21:7d:f9:ac:f0:00:27:96:b9:4d:18: 97:cb:8f:7c:48:3b:a0:62:c0:b5:4f:79:78:a8:cf:f9: b4:82:12:60:a8:4e:f1:10:ae:f0:b4:08:ae:05:ec:7a: cd:b3:04:53:e1:7d:53:96:80:10:69:fe:f2:2a:5d:ea: 91:4b:35:a4:bd:ed:13:aa:61:97:9e:05:5b:c2:0a:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3e:5b:45:c2:6e:48:70:84:96:75:f4:ce:b7:70:24:9c: 9f:cb:d2:72:8e:7b:e6:25:3c:66:21:2e:df:ca:05:9a: 58:f2:b9:46:ed:0e:41:d4:8a:42:22:2b:80:4e:58:69: a8:7d:bc:64:c7:78:a4:2d:69:1f:2d:34:d9:62:1a:00: 67:95:e3:f1:fe:24:f7:58:7f:71:1c:cb:23:f9:3f:4c: 51:cb:4d:bc:81:15:a4:b2:80:0f:92:4b:51:d5:21:8f: 9b:0f:8b:78:4c:4d:ee:17:d9:f6:79:74:f1:5a:40:01: 3a:e5:d7:6a:13:e8:e0:ac:91:54:a4:89:68:58:ab:ce Fingerprint (MD5): 65:38:BA:CC:6B:29:89:78:83:02:E5:48:62:AE:E1:A7 Fingerprint (SHA1): 83:0A:73:3B:D2:2C:08:5D:E5:FD:DC:B5:9C:D2:F7:C4:8F:B4:3F:68 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1458: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161460 (0x420d33b4) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Tue Nov 08 16:14:54 2011 Not After : Tue Nov 08 16:14:54 2061 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:b2:99:78:34:9d:21:0a:62:ab:1c:b6:db:a2:a2:f8: 91:3b:4d:42:f9:fc:54:04:fd:29:90:27:df:74:5c:6b: 2f:33:0b:4e:cb:c3:59:9c:86:5d:bf:a6:d1:18:82:a0: 5e:27:37:e8:dd:dd:a8:6b:27:9a:92:50:c9:30:dd:04: 40:47:3a:45:d9:a1:a7:b7:9b:36:03:00:bd:0e:6c:a0: e5:c6:a7:34:e0:77:d0:ea:98:5b:fe:1c:88:ec:59:26: 42:2b:40:6c:c3:dc:9c:0f:82:58:ce:63:f3:19:d3:c9: 80:15:b7:77:d8:36:d7:60:ad:f3:a2:29:06:2b:5e:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d3:eb:dc:64:09:a9:03:b8:a0:40:03:ae:99:55:70:82: 5c:c3:23:2a:27:89:3b:a6:f9:fd:c4:14:d1:6d:a5:70: 94:74:95:7f:8f:f7:5a:e3:e8:83:3f:0b:f3:a3:5b:be: de:cd:f2:bb:c6:a2:4a:77:e0:3b:bb:e5:88:7d:44:c3: 34:9e:fc:56:b7:03:7d:94:04:76:8c:58:5a:a6:6d:b4: 80:17:e5:0b:e5:d4:f5:37:1b:f2:ef:f9:60:8c:cc:20: e7:81:5b:9f:ca:eb:5b:4d:46:37:3e:29:5d:da:9c:12: da:a4:d0:2b:ff:b4:41:26:33:3a:dd:f9:9a:1b:b0:82 Fingerprint (MD5): 97:4A:39:5D:E3:90:8E:6A:FA:07:EF:B5:A6:28:BD:D4 Fingerprint (SHA1): 98:64:E9:73:9A:F6:9F:78:05:24:43:77:86:AE:74:52:3D:76:0B:40 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1459: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161461 (0x420d33b5) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Tue Nov 08 16:14:54 2011 Not After : Tue Nov 08 16:14:54 2061 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:f1:58:64:e7:9f:e2:f9:aa:85:b4:a0:49:18:f4:18: f6:65:4a:d7:40:81:bd:ae:11:fe:5e:c8:df:ed:12:3e: 76:09:48:83:3c:38:f6:7a:78:5c:ad:af:5b:8f:51:dd: ca:d8:07:21:00:fe:5e:2a:9b:ad:91:b5:ab:fe:a6:ba: 6e:15:d5:dc:96:22:e3:b3:74:6c:05:0f:93:78:64:76: 70:60:ad:a2:34:63:25:a7:85:66:de:38:15:3f:69:0b: 79:00:b3:fa:a1:63:d5:3f:2d:8c:db:f5:8a:28:1b:a4: c0:ec:7a:9e:a0:60:30:11:18:9a:7b:37:a6:9a:a5:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3e:0e:d3:4b:8f:7e:2e:e1:30:d7:68:58:81:84:6e:61: b6:26:6e:34:72:55:94:c2:37:a8:89:d5:f3:fd:24:e3: c9:67:53:82:6b:a9:4c:4e:3d:a7:4c:5a:00:c0:bc:7c: c8:5f:13:b7:cc:6b:7a:e8:44:01:da:9b:64:57:ba:6c: 86:f4:f6:97:a7:3e:2e:1f:ba:5f:6b:79:d3:39:43:38: 91:3b:c7:ae:4d:15:1f:4d:e5:5a:4a:2d:0a:a5:21:48: 7c:08:13:a2:56:41:b8:97:00:48:d2:20:d0:41:fb:a6: 05:e1:cc:84:7f:2c:69:89:7a:2f:bc:3a:44:8f:d6:e4 Fingerprint (MD5): 2E:1A:03:FC:1B:6D:57:A5:E8:22:5E:5A:D7:86:69:E4 Fingerprint (SHA1): 5C:8D:DF:F1:E2:A8:66:38:DC:3F:5F:BA:13:94:63:16:E9:12:41:F8 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1460: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161462 (0x420d33b6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Tue Nov 08 16:14:54 2011 Not After : Tue Nov 08 16:14:54 2061 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:8c:55:d5:d4:81:d8:e6:16:55:49:71:08:ab:d2:b3: 35:72:54:b7:e2:7c:17:96:fb:97:22:45:e7:9f:15:fd: 10:f2:6b:28:fb:01:89:fc:9f:dd:38:d5:c0:2c:18:b8: 17:ef:ac:03:99:79:6f:c9:82:ed:38:7f:ba:af:11:a6: cc:a8:54:1d:a9:26:c8:60:37:83:2b:0f:8d:42:71:3b: 44:9d:e7:1b:f2:a4:2e:df:00:a8:fc:37:bc:ef:d4:93: 51:b3:b9:49:4f:54:a1:e1:a0:27:71:3c:d4:19:a6:75: de:90:c5:05:d6:87:88:90:d9:3c:ac:88:6b:3e:e2:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 04:21:74:5b:00:9e:7b:b8:ac:ae:1b:17:dd:f1:bc:d2: 19:90:57:13:8e:21:3d:41:85:09:cf:d7:08:8c:9c:29: 08:87:0f:b9:ef:ab:6e:8c:ab:bb:61:e8:66:dd:fa:74: 23:cf:19:75:eb:94:fc:1d:4f:9e:e2:1e:31:9f:ce:34: b9:1b:78:12:31:86:e8:11:94:4d:db:b7:ae:04:d9:65: d1:71:02:e8:4a:ba:fe:8b:5f:b5:7e:9c:af:3b:1b:11: fa:98:7c:2e:ff:5a:f9:f1:7f:21:a0:03:fe:51:8f:74: 81:43:85:93:d9:c0:0e:91:20:90:4b:7b:f0:a8:c5:93 Fingerprint (MD5): C4:5E:23:09:BB:A9:19:40:BB:26:51:2A:A3:A7:ED:05 Fingerprint (SHA1): C0:34:C9:89:7A:3F:7B:75:37:C7:33:62:0D:83:02:47:50:F8:54:C6 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1461: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161463 (0x420d33b7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Tue Nov 08 16:14:54 2011 Not After : Tue Nov 08 16:14:54 2061 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:96:2e:18:d1:6f:4b:00:f7:26:9c:50:a2:f6:8b:a0: b3:f7:96:7f:3c:cc:a3:ed:e6:bf:e7:d5:da:c7:a5:a6: 1b:22:03:4a:94:78:3d:2a:df:a7:46:a4:5a:8e:76:49: d1:f2:30:ce:7a:eb:76:e3:3e:f1:26:ed:5c:4b:52:37: aa:32:59:c3:75:53:c0:a1:38:37:47:af:b5:ac:6e:be: 5c:f4:e0:ee:5c:b8:2a:5b:9f:d4:8b:58:f5:bb:73:74: 92:c6:0f:82:4a:48:7a:f3:6d:58:9e:54:55:31:50:42: 73:49:42:41:cf:f0:c5:48:59:74:06:f5:14:05:7d:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 50:a3:dc:c8:2a:78:b6:63:31:1e:2c:01:75:a6:37:51: c5:b7:54:57:2b:a4:fb:99:d7:30:41:2c:2f:e6:66:70: fe:f9:98:40:0d:eb:50:e7:0c:d4:c0:fc:19:ce:d2:ec: 96:b1:f8:36:c4:50:be:ca:dd:9c:90:31:a7:6b:20:b8: 9e:af:60:d6:8d:15:d6:70:ba:f5:eb:fb:f1:0c:1b:a6: a2:a0:f9:a5:44:82:4d:83:60:93:ee:68:d5:cd:c1:38: 1f:4a:79:7e:22:60:04:ce:ac:0a:b9:a1:8f:92:92:d0: a1:ff:d4:e6:f8:bb:dd:b5:3f:16:b0:9c:f3:d9:e7:cf Fingerprint (MD5): A8:59:79:06:C0:90:F9:5A:58:19:20:16:74:57:3C:76 Fingerprint (SHA1): 83:45:BB:C9:8D:9B:4D:61:BB:58:0B:C2:06:46:64:2D:97:27:4F:0E Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1462: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1463: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161478 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1464: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1465: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1466: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1467: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161479 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1468: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1469: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1470: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1471: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161480 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1472: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1473: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1474: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1475: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1108161481 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1476: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #1477: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1478: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161478 (0x420d33c6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:57 2011 Not After : Tue Nov 08 16:14:57 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:a9:2b:f7:ee:1d:47:a2:ea:b0:80:d4:f4:09:6b:ff: ca:d8:bf:d1:51:d5:7e:6b:3e:a5:3d:38:c6:79:d9:65: bc:df:9a:0f:b8:39:31:3f:30:f6:ac:5d:f8:6f:82:e8: 83:7d:06:1b:ea:24:9a:a1:74:9c:cb:e2:c3:f1:ae:14: 90:e8:38:b0:93:1b:71:9a:8e:37:2e:7a:2e:5c:67:fb: 6b:2c:c7:4b:bf:5c:38:22:98:f9:68:07:ec:aa:a4:b3: 41:f2:2e:3a:30:01:75:e8:cc:e8:fa:5f:67:97:6f:45: 1c:aa:e6:a7:1f:6f:41:07:66:9a:96:ef:7f:6c:ae:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 13:5a:ca:9c:4c:9c:1d:56:0e:57:83:f6:8c:a4:e0:5a: 2e:b2:31:07:4b:6b:81:75:97:d8:37:d6:0e:b9:61:99: 5c:97:f9:17:c2:61:e7:1a:f1:c1:78:9b:f2:a7:47:4f: 1c:8c:bb:cf:10:83:50:7f:b6:9c:c0:52:05:0f:46:57: b5:63:05:a2:55:b8:33:66:cb:1e:98:da:e3:c1:63:eb: e0:33:df:df:d2:2c:7c:1a:de:c9:97:69:9f:97:42:27: 45:e9:74:5e:58:39:36:cf:17:4a:b1:18:cd:9f:cd:17: 90:ed:08:c5:8b:2c:a0:7c:d4:21:50:a3:3f:01:cd:2c Fingerprint (MD5): 35:CA:16:BA:54:E4:83:79:7B:04:63:4B:D9:7D:74:AE Fingerprint (SHA1): 18:A0:52:C3:93:CF:6E:60:A7:20:D1:A8:59:73:1A:07:B0:73:44:8A Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1479: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1480: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161479 (0x420d33c7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:58 2011 Not After : Tue Nov 08 16:14:58 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:94:09:88:7f:45:0a:47:c2:89:fd:14:0f:21:64:f7: 06:86:94:95:f8:0c:32:92:95:b2:6c:f2:ca:8f:63:0b: cf:89:c1:65:52:ad:09:62:f9:65:2d:c6:b2:bf:6d:23: e9:0a:62:ef:91:7e:b3:62:5d:6b:95:06:9c:cf:72:db: f3:30:4b:90:e7:67:16:d6:cd:b5:af:c3:31:8e:c1:93: f8:65:46:a1:85:fa:99:5e:05:d2:e2:40:98:59:f8:70: 9a:c9:a5:f4:dd:0d:da:73:5a:47:49:70:5c:0e:81:b2: ae:f5:be:cc:99:19:54:b8:34:ce:56:9f:65:df:66:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 07:c5:2e:16:43:3f:25:85:29:d0:cb:77:23:a7:ed:c4: d1:fc:ea:91:28:85:06:7b:65:8e:23:e9:84:12:71:81: 6b:a2:3c:69:ce:79:48:1b:88:26:c3:32:bb:cb:c3:66: 4c:e4:5d:80:b1:94:f9:ed:81:af:e7:c8:bd:2b:ff:be: 67:ba:2c:2d:2f:7a:31:dd:a9:6e:0c:3d:7a:42:98:88: 1b:97:09:4c:0b:8e:82:b1:ef:16:b7:35:28:46:be:88: 11:8a:5f:f9:a4:88:bd:1f:c4:a0:dd:1e:37:46:70:ce: da:0a:9c:a3:d8:a7:77:70:f7:46:60:33:04:dc:0e:34 Fingerprint (MD5): 42:28:F6:8C:85:F4:3B:17:3B:41:D5:61:CD:80:20:25 Fingerprint (SHA1): 45:6A:F0:63:96:AE:E4:49:81:FB:75:A7:00:2F:66:3F:2F:75:80:E4 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1481: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1482: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161480 (0x420d33c8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:14:58 2011 Not After : Tue Nov 08 16:14:58 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:a2:6b:f3:14:8b:be:02:51:eb:11:05:94:46:22:71: c0:25:04:a8:7e:8a:e3:7c:14:31:39:cd:aa:b7:66:86: af:e3:5b:c9:9b:45:d1:ec:3b:3c:f2:7c:81:a5:52:de: 42:38:f3:d2:fc:c7:2f:bc:05:c1:3f:58:97:12:7d:59: e8:3a:4e:28:8c:0e:3a:17:f1:23:a8:72:3a:fa:64:46: f6:b6:ca:f9:d7:41:fd:d8:07:86:d6:74:6c:dc:77:3d: 70:16:99:8c:4a:2d:8e:dc:3a:21:33:fa:69:99:7b:f4: d9:95:45:d6:ae:fc:fd:3d:8b:93:4d:9e:87:11:5c:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 13:8e:21:84:8b:1a:19:64:5e:2a:5b:5a:dd:b7:74:9f: ed:fa:c2:a8:af:f6:76:c1:c9:3f:fc:40:1a:78:0b:b9: 14:02:1f:a2:7c:67:9b:9f:a7:34:f2:4a:c1:21:67:9e: 83:99:a8:9e:60:d3:20:9d:57:9d:4f:dc:2d:95:04:0d: 18:20:15:25:10:d3:f8:8c:1c:0a:dc:4d:81:c9:e8:99: 09:52:7e:7e:18:97:78:41:d3:f0:1e:d8:36:17:da:42: 61:a4:8a:f2:49:fb:3d:02:2e:ca:71:3c:26:f1:3a:c5: 95:fa:03:6d:98:35:98:e8:bd:6a:ca:ff:33:44:1b:0a Fingerprint (MD5): 5A:3D:64:49:21:AA:D3:6E:BB:94:DB:BB:20:7F:0C:DF Fingerprint (SHA1): 13:5B:4F:AA:EC:FA:AF:B1:A9:31:62:07:C8:5F:B8:35:5B:60:AC:A7 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1483: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1484: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1485: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1486: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1487: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161478 (0x420d33c6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:57 2011 Not After : Tue Nov 08 16:14:57 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:a9:2b:f7:ee:1d:47:a2:ea:b0:80:d4:f4:09:6b:ff: ca:d8:bf:d1:51:d5:7e:6b:3e:a5:3d:38:c6:79:d9:65: bc:df:9a:0f:b8:39:31:3f:30:f6:ac:5d:f8:6f:82:e8: 83:7d:06:1b:ea:24:9a:a1:74:9c:cb:e2:c3:f1:ae:14: 90:e8:38:b0:93:1b:71:9a:8e:37:2e:7a:2e:5c:67:fb: 6b:2c:c7:4b:bf:5c:38:22:98:f9:68:07:ec:aa:a4:b3: 41:f2:2e:3a:30:01:75:e8:cc:e8:fa:5f:67:97:6f:45: 1c:aa:e6:a7:1f:6f:41:07:66:9a:96:ef:7f:6c:ae:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 13:5a:ca:9c:4c:9c:1d:56:0e:57:83:f6:8c:a4:e0:5a: 2e:b2:31:07:4b:6b:81:75:97:d8:37:d6:0e:b9:61:99: 5c:97:f9:17:c2:61:e7:1a:f1:c1:78:9b:f2:a7:47:4f: 1c:8c:bb:cf:10:83:50:7f:b6:9c:c0:52:05:0f:46:57: b5:63:05:a2:55:b8:33:66:cb:1e:98:da:e3:c1:63:eb: e0:33:df:df:d2:2c:7c:1a:de:c9:97:69:9f:97:42:27: 45:e9:74:5e:58:39:36:cf:17:4a:b1:18:cd:9f:cd:17: 90:ed:08:c5:8b:2c:a0:7c:d4:21:50:a3:3f:01:cd:2c Fingerprint (MD5): 35:CA:16:BA:54:E4:83:79:7B:04:63:4B:D9:7D:74:AE Fingerprint (SHA1): 18:A0:52:C3:93:CF:6E:60:A7:20:D1:A8:59:73:1A:07:B0:73:44:8A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1488: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1489: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161479 (0x420d33c7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:58 2011 Not After : Tue Nov 08 16:14:58 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:94:09:88:7f:45:0a:47:c2:89:fd:14:0f:21:64:f7: 06:86:94:95:f8:0c:32:92:95:b2:6c:f2:ca:8f:63:0b: cf:89:c1:65:52:ad:09:62:f9:65:2d:c6:b2:bf:6d:23: e9:0a:62:ef:91:7e:b3:62:5d:6b:95:06:9c:cf:72:db: f3:30:4b:90:e7:67:16:d6:cd:b5:af:c3:31:8e:c1:93: f8:65:46:a1:85:fa:99:5e:05:d2:e2:40:98:59:f8:70: 9a:c9:a5:f4:dd:0d:da:73:5a:47:49:70:5c:0e:81:b2: ae:f5:be:cc:99:19:54:b8:34:ce:56:9f:65:df:66:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 07:c5:2e:16:43:3f:25:85:29:d0:cb:77:23:a7:ed:c4: d1:fc:ea:91:28:85:06:7b:65:8e:23:e9:84:12:71:81: 6b:a2:3c:69:ce:79:48:1b:88:26:c3:32:bb:cb:c3:66: 4c:e4:5d:80:b1:94:f9:ed:81:af:e7:c8:bd:2b:ff:be: 67:ba:2c:2d:2f:7a:31:dd:a9:6e:0c:3d:7a:42:98:88: 1b:97:09:4c:0b:8e:82:b1:ef:16:b7:35:28:46:be:88: 11:8a:5f:f9:a4:88:bd:1f:c4:a0:dd:1e:37:46:70:ce: da:0a:9c:a3:d8:a7:77:70:f7:46:60:33:04:dc:0e:34 Fingerprint (MD5): 42:28:F6:8C:85:F4:3B:17:3B:41:D5:61:CD:80:20:25 Fingerprint (SHA1): 45:6A:F0:63:96:AE:E4:49:81:FB:75:A7:00:2F:66:3F:2F:75:80:E4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161480 (0x420d33c8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:14:58 2011 Not After : Tue Nov 08 16:14:58 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:a2:6b:f3:14:8b:be:02:51:eb:11:05:94:46:22:71: c0:25:04:a8:7e:8a:e3:7c:14:31:39:cd:aa:b7:66:86: af:e3:5b:c9:9b:45:d1:ec:3b:3c:f2:7c:81:a5:52:de: 42:38:f3:d2:fc:c7:2f:bc:05:c1:3f:58:97:12:7d:59: e8:3a:4e:28:8c:0e:3a:17:f1:23:a8:72:3a:fa:64:46: f6:b6:ca:f9:d7:41:fd:d8:07:86:d6:74:6c:dc:77:3d: 70:16:99:8c:4a:2d:8e:dc:3a:21:33:fa:69:99:7b:f4: d9:95:45:d6:ae:fc:fd:3d:8b:93:4d:9e:87:11:5c:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 13:8e:21:84:8b:1a:19:64:5e:2a:5b:5a:dd:b7:74:9f: ed:fa:c2:a8:af:f6:76:c1:c9:3f:fc:40:1a:78:0b:b9: 14:02:1f:a2:7c:67:9b:9f:a7:34:f2:4a:c1:21:67:9e: 83:99:a8:9e:60:d3:20:9d:57:9d:4f:dc:2d:95:04:0d: 18:20:15:25:10:d3:f8:8c:1c:0a:dc:4d:81:c9:e8:99: 09:52:7e:7e:18:97:78:41:d3:f0:1e:d8:36:17:da:42: 61:a4:8a:f2:49:fb:3d:02:2e:ca:71:3c:26:f1:3a:c5: 95:fa:03:6d:98:35:98:e8:bd:6a:ca:ff:33:44:1b:0a Fingerprint (MD5): 5A:3D:64:49:21:AA:D3:6E:BB:94:DB:BB:20:7F:0C:DF Fingerprint (SHA1): 13:5B:4F:AA:EC:FA:AF:B1:A9:31:62:07:C8:5F:B8:35:5B:60:AC:A7 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1494: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161482 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1495: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1496: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1497: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1498: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161483 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1499: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1500: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1501: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1502: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161484 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1503: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1504: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1505: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1506: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1108161485 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1507: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #1508: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1509: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1510: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1108161486 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1511: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #1512: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1513: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161482 (0x420d33ca) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:59 2011 Not After : Tue Nov 08 16:14:59 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:97:df:da:a5:e0:7c:d5:a2:5b:38:65:32:c1:63:ee: 02:cd:28:15:fd:21:fe:06:e3:31:dc:dc:65:d1:e3:01: d7:56:21:6f:5e:a9:81:10:d7:d1:13:80:5d:ef:58:42: 6d:dd:f7:23:00:5c:86:9e:65:12:6e:7c:f1:30:11:1c: 36:ad:11:0e:46:72:88:7a:0b:50:6c:03:84:4a:dd:a0: 76:43:76:e5:53:bf:a5:c2:32:08:cf:ac:8d:a3:ce:0e: ec:99:e1:af:34:43:49:73:71:ef:8d:4a:03:f3:19:01: d3:84:e7:15:d5:03:62:7c:b3:ce:17:27:56:f8:45:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 34:49:35:7a:8d:3f:2d:2a:17:78:96:d1:ac:4f:6b:f3: 57:9a:64:2d:80:fa:7c:47:ac:ea:51:71:82:7c:6c:5c: 89:0b:f6:c3:d2:32:21:ba:70:ac:d4:30:8d:a0:ff:9d: be:27:fd:c4:51:80:65:d3:7f:f3:d1:d8:16:a2:fb:46: fc:b9:03:f3:05:67:c8:5b:0e:66:b0:df:bf:32:09:f5: 5f:71:74:b0:38:e5:d9:87:8e:db:00:98:d3:26:5d:9d: 1c:7b:9a:fe:cc:cc:33:c1:13:90:a7:54:7e:f7:5f:02: e5:9b:f6:60:dd:b6:25:af:d6:d6:dc:0c:5e:c6:9f:60 Fingerprint (MD5): 18:8C:A9:D6:88:A2:34:A9:08:2F:9B:EB:11:B4:8C:B5 Fingerprint (SHA1): 84:40:E2:82:F5:08:A8:DB:BF:BE:57:09:21:DD:E5:81:86:2C:AB:45 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1514: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1515: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161483 (0x420d33cb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:59 2011 Not After : Tue Nov 08 16:14:59 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:bb:dc:63:05:0d:9a:b3:be:7c:46:f2:f8:df:21:84: 76:36:57:f5:eb:42:bf:ff:9f:a1:d1:64:56:e3:5e:15: 43:55:64:be:82:18:f9:4c:4f:bc:3e:ea:56:35:55:bc: 65:ce:86:df:2d:ee:fd:86:2f:5e:fa:da:c9:b1:e8:6b: 73:86:b1:3f:0e:f6:fc:b4:70:41:52:26:ca:52:24:b6: be:6f:27:81:86:63:c4:39:60:bf:b6:39:c8:28:5d:75: c3:b4:00:ab:33:ac:a0:5a:3f:06:59:2e:7f:51:a8:05: c7:9e:49:5e:de:32:96:e1:61:0e:72:43:c2:76:62:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 42:96:c4:88:cf:d7:27:4d:d4:4c:7a:9d:b5:14:dd:e5: 11:9f:83:10:c9:31:33:05:31:b4:26:66:a0:e4:6f:e0: 49:b3:4c:f3:48:3a:4d:48:40:7d:e2:d8:a9:c2:fc:c8: 06:f2:5b:21:4c:f1:ed:5c:f0:03:ec:41:b6:9f:a5:91: ed:d0:db:24:de:6c:89:e5:12:f3:1e:43:25:9e:ba:ff: 46:3f:ac:51:05:3f:fd:0c:59:4d:6a:b9:cf:f0:7f:16: 08:9e:d4:ae:c5:db:9f:2a:07:e0:dc:90:2d:56:30:4f: a3:dd:73:8d:57:bc:d1:bc:aa:b2:9f:e9:bb:a2:c9:76 Fingerprint (MD5): B9:79:4C:0E:A2:44:34:DA:D9:5C:89:57:85:80:3E:4E Fingerprint (SHA1): CB:1F:06:98:18:B1:39:73:E9:63:1F:7E:00:02:E4:2C:2C:9E:15:35 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1516: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1517: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161484 (0x420d33cc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:15:00 2011 Not After : Tue Nov 08 16:15:00 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:03:ca:9f:cb:6a:1a:21:c9:cb:b5:45:fe:9a:e2:9f: c9:f3:76:3b:ac:3e:1f:61:bf:c8:a3:0e:c5:1d:20:87: b7:f0:68:19:ed:5b:ac:ff:cb:6d:4c:75:90:05:4d:73: 97:42:18:93:f1:75:19:c4:e5:0e:47:42:d4:7f:a7:2d: 03:14:29:36:c9:23:d9:a2:6f:d4:77:9a:3c:23:75:9c: 80:72:77:d5:ed:73:08:5f:c6:aa:f3:88:4d:37:c5:c6: e1:cc:80:33:5e:fe:c7:0a:cb:32:66:9c:e3:8c:83:ed: 93:34:65:c4:04:b4:9a:dd:ef:9f:9f:8f:ee:fb:fb:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 86:20:ce:7c:32:54:79:ed:22:9b:60:85:ed:4e:58:0f: ba:2f:dc:2a:4d:a2:f4:f5:44:9b:ee:c7:ab:12:90:f8: b7:9e:ab:04:c5:84:0c:5e:a7:96:94:7c:1f:9d:75:9a: 29:5b:bc:b4:a4:57:71:7e:60:bd:a1:27:c7:00:4d:bd: 8c:9f:fa:6c:bc:6c:8f:81:4b:c1:44:2e:54:b7:df:25: 2f:9f:33:6e:76:0e:c5:1c:e9:e4:6b:98:1e:22:60:f6: c2:eb:e5:6b:5d:e0:f6:15:67:45:14:ea:19:75:08:bf: 2e:f4:80:64:31:ce:2f:a9:b5:c0:04:99:50:12:cb:53 Fingerprint (MD5): B7:D0:1C:43:FD:37:EE:56:C0:C1:AE:6F:A1:F8:4B:FD Fingerprint (SHA1): CE:0F:44:69:4D:29:6F:A2:13:68:D2:8E:BF:BB:0B:20:B8:15:26:C4 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1518: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1519: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1520: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1521: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1522: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161482 (0x420d33ca) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:59 2011 Not After : Tue Nov 08 16:14:59 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:97:df:da:a5:e0:7c:d5:a2:5b:38:65:32:c1:63:ee: 02:cd:28:15:fd:21:fe:06:e3:31:dc:dc:65:d1:e3:01: d7:56:21:6f:5e:a9:81:10:d7:d1:13:80:5d:ef:58:42: 6d:dd:f7:23:00:5c:86:9e:65:12:6e:7c:f1:30:11:1c: 36:ad:11:0e:46:72:88:7a:0b:50:6c:03:84:4a:dd:a0: 76:43:76:e5:53:bf:a5:c2:32:08:cf:ac:8d:a3:ce:0e: ec:99:e1:af:34:43:49:73:71:ef:8d:4a:03:f3:19:01: d3:84:e7:15:d5:03:62:7c:b3:ce:17:27:56:f8:45:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 34:49:35:7a:8d:3f:2d:2a:17:78:96:d1:ac:4f:6b:f3: 57:9a:64:2d:80:fa:7c:47:ac:ea:51:71:82:7c:6c:5c: 89:0b:f6:c3:d2:32:21:ba:70:ac:d4:30:8d:a0:ff:9d: be:27:fd:c4:51:80:65:d3:7f:f3:d1:d8:16:a2:fb:46: fc:b9:03:f3:05:67:c8:5b:0e:66:b0:df:bf:32:09:f5: 5f:71:74:b0:38:e5:d9:87:8e:db:00:98:d3:26:5d:9d: 1c:7b:9a:fe:cc:cc:33:c1:13:90:a7:54:7e:f7:5f:02: e5:9b:f6:60:dd:b6:25:af:d6:d6:dc:0c:5e:c6:9f:60 Fingerprint (MD5): 18:8C:A9:D6:88:A2:34:A9:08:2F:9B:EB:11:B4:8C:B5 Fingerprint (SHA1): 84:40:E2:82:F5:08:A8:DB:BF:BE:57:09:21:DD:E5:81:86:2C:AB:45 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1523: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1524: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161483 (0x420d33cb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:59 2011 Not After : Tue Nov 08 16:14:59 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:bb:dc:63:05:0d:9a:b3:be:7c:46:f2:f8:df:21:84: 76:36:57:f5:eb:42:bf:ff:9f:a1:d1:64:56:e3:5e:15: 43:55:64:be:82:18:f9:4c:4f:bc:3e:ea:56:35:55:bc: 65:ce:86:df:2d:ee:fd:86:2f:5e:fa:da:c9:b1:e8:6b: 73:86:b1:3f:0e:f6:fc:b4:70:41:52:26:ca:52:24:b6: be:6f:27:81:86:63:c4:39:60:bf:b6:39:c8:28:5d:75: c3:b4:00:ab:33:ac:a0:5a:3f:06:59:2e:7f:51:a8:05: c7:9e:49:5e:de:32:96:e1:61:0e:72:43:c2:76:62:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 42:96:c4:88:cf:d7:27:4d:d4:4c:7a:9d:b5:14:dd:e5: 11:9f:83:10:c9:31:33:05:31:b4:26:66:a0:e4:6f:e0: 49:b3:4c:f3:48:3a:4d:48:40:7d:e2:d8:a9:c2:fc:c8: 06:f2:5b:21:4c:f1:ed:5c:f0:03:ec:41:b6:9f:a5:91: ed:d0:db:24:de:6c:89:e5:12:f3:1e:43:25:9e:ba:ff: 46:3f:ac:51:05:3f:fd:0c:59:4d:6a:b9:cf:f0:7f:16: 08:9e:d4:ae:c5:db:9f:2a:07:e0:dc:90:2d:56:30:4f: a3:dd:73:8d:57:bc:d1:bc:aa:b2:9f:e9:bb:a2:c9:76 Fingerprint (MD5): B9:79:4C:0E:A2:44:34:DA:D9:5C:89:57:85:80:3E:4E Fingerprint (SHA1): CB:1F:06:98:18:B1:39:73:E9:63:1F:7E:00:02:E4:2C:2C:9E:15:35 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1525: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1526: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161484 (0x420d33cc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:15:00 2011 Not After : Tue Nov 08 16:15:00 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:03:ca:9f:cb:6a:1a:21:c9:cb:b5:45:fe:9a:e2:9f: c9:f3:76:3b:ac:3e:1f:61:bf:c8:a3:0e:c5:1d:20:87: b7:f0:68:19:ed:5b:ac:ff:cb:6d:4c:75:90:05:4d:73: 97:42:18:93:f1:75:19:c4:e5:0e:47:42:d4:7f:a7:2d: 03:14:29:36:c9:23:d9:a2:6f:d4:77:9a:3c:23:75:9c: 80:72:77:d5:ed:73:08:5f:c6:aa:f3:88:4d:37:c5:c6: e1:cc:80:33:5e:fe:c7:0a:cb:32:66:9c:e3:8c:83:ed: 93:34:65:c4:04:b4:9a:dd:ef:9f:9f:8f:ee:fb:fb:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 86:20:ce:7c:32:54:79:ed:22:9b:60:85:ed:4e:58:0f: ba:2f:dc:2a:4d:a2:f4:f5:44:9b:ee:c7:ab:12:90:f8: b7:9e:ab:04:c5:84:0c:5e:a7:96:94:7c:1f:9d:75:9a: 29:5b:bc:b4:a4:57:71:7e:60:bd:a1:27:c7:00:4d:bd: 8c:9f:fa:6c:bc:6c:8f:81:4b:c1:44:2e:54:b7:df:25: 2f:9f:33:6e:76:0e:c5:1c:e9:e4:6b:98:1e:22:60:f6: c2:eb:e5:6b:5d:e0:f6:15:67:45:14:ea:19:75:08:bf: 2e:f4:80:64:31:ce:2f:a9:b5:c0:04:99:50:12:cb:53 Fingerprint (MD5): B7:D0:1C:43:FD:37:EE:56:C0:C1:AE:6F:A1:F8:4B:FD Fingerprint (SHA1): CE:0F:44:69:4D:29:6F:A2:13:68:D2:8E:BF:BB:0B:20:B8:15:26:C4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1527: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1528: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161482 (0x420d33ca) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:59 2011 Not After : Tue Nov 08 16:14:59 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:97:df:da:a5:e0:7c:d5:a2:5b:38:65:32:c1:63:ee: 02:cd:28:15:fd:21:fe:06:e3:31:dc:dc:65:d1:e3:01: d7:56:21:6f:5e:a9:81:10:d7:d1:13:80:5d:ef:58:42: 6d:dd:f7:23:00:5c:86:9e:65:12:6e:7c:f1:30:11:1c: 36:ad:11:0e:46:72:88:7a:0b:50:6c:03:84:4a:dd:a0: 76:43:76:e5:53:bf:a5:c2:32:08:cf:ac:8d:a3:ce:0e: ec:99:e1:af:34:43:49:73:71:ef:8d:4a:03:f3:19:01: d3:84:e7:15:d5:03:62:7c:b3:ce:17:27:56:f8:45:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 34:49:35:7a:8d:3f:2d:2a:17:78:96:d1:ac:4f:6b:f3: 57:9a:64:2d:80:fa:7c:47:ac:ea:51:71:82:7c:6c:5c: 89:0b:f6:c3:d2:32:21:ba:70:ac:d4:30:8d:a0:ff:9d: be:27:fd:c4:51:80:65:d3:7f:f3:d1:d8:16:a2:fb:46: fc:b9:03:f3:05:67:c8:5b:0e:66:b0:df:bf:32:09:f5: 5f:71:74:b0:38:e5:d9:87:8e:db:00:98:d3:26:5d:9d: 1c:7b:9a:fe:cc:cc:33:c1:13:90:a7:54:7e:f7:5f:02: e5:9b:f6:60:dd:b6:25:af:d6:d6:dc:0c:5e:c6:9f:60 Fingerprint (MD5): 18:8C:A9:D6:88:A2:34:A9:08:2F:9B:EB:11:B4:8C:B5 Fingerprint (SHA1): 84:40:E2:82:F5:08:A8:DB:BF:BE:57:09:21:DD:E5:81:86:2C:AB:45 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1529: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161482 (0x420d33ca) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:59 2011 Not After : Tue Nov 08 16:14:59 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:97:df:da:a5:e0:7c:d5:a2:5b:38:65:32:c1:63:ee: 02:cd:28:15:fd:21:fe:06:e3:31:dc:dc:65:d1:e3:01: d7:56:21:6f:5e:a9:81:10:d7:d1:13:80:5d:ef:58:42: 6d:dd:f7:23:00:5c:86:9e:65:12:6e:7c:f1:30:11:1c: 36:ad:11:0e:46:72:88:7a:0b:50:6c:03:84:4a:dd:a0: 76:43:76:e5:53:bf:a5:c2:32:08:cf:ac:8d:a3:ce:0e: ec:99:e1:af:34:43:49:73:71:ef:8d:4a:03:f3:19:01: d3:84:e7:15:d5:03:62:7c:b3:ce:17:27:56:f8:45:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 34:49:35:7a:8d:3f:2d:2a:17:78:96:d1:ac:4f:6b:f3: 57:9a:64:2d:80:fa:7c:47:ac:ea:51:71:82:7c:6c:5c: 89:0b:f6:c3:d2:32:21:ba:70:ac:d4:30:8d:a0:ff:9d: be:27:fd:c4:51:80:65:d3:7f:f3:d1:d8:16:a2:fb:46: fc:b9:03:f3:05:67:c8:5b:0e:66:b0:df:bf:32:09:f5: 5f:71:74:b0:38:e5:d9:87:8e:db:00:98:d3:26:5d:9d: 1c:7b:9a:fe:cc:cc:33:c1:13:90:a7:54:7e:f7:5f:02: e5:9b:f6:60:dd:b6:25:af:d6:d6:dc:0c:5e:c6:9f:60 Fingerprint (MD5): 18:8C:A9:D6:88:A2:34:A9:08:2F:9B:EB:11:B4:8C:B5 Fingerprint (SHA1): 84:40:E2:82:F5:08:A8:DB:BF:BE:57:09:21:DD:E5:81:86:2C:AB:45 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1530: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161483 (0x420d33cb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:59 2011 Not After : Tue Nov 08 16:14:59 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:bb:dc:63:05:0d:9a:b3:be:7c:46:f2:f8:df:21:84: 76:36:57:f5:eb:42:bf:ff:9f:a1:d1:64:56:e3:5e:15: 43:55:64:be:82:18:f9:4c:4f:bc:3e:ea:56:35:55:bc: 65:ce:86:df:2d:ee:fd:86:2f:5e:fa:da:c9:b1:e8:6b: 73:86:b1:3f:0e:f6:fc:b4:70:41:52:26:ca:52:24:b6: be:6f:27:81:86:63:c4:39:60:bf:b6:39:c8:28:5d:75: c3:b4:00:ab:33:ac:a0:5a:3f:06:59:2e:7f:51:a8:05: c7:9e:49:5e:de:32:96:e1:61:0e:72:43:c2:76:62:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 42:96:c4:88:cf:d7:27:4d:d4:4c:7a:9d:b5:14:dd:e5: 11:9f:83:10:c9:31:33:05:31:b4:26:66:a0:e4:6f:e0: 49:b3:4c:f3:48:3a:4d:48:40:7d:e2:d8:a9:c2:fc:c8: 06:f2:5b:21:4c:f1:ed:5c:f0:03:ec:41:b6:9f:a5:91: ed:d0:db:24:de:6c:89:e5:12:f3:1e:43:25:9e:ba:ff: 46:3f:ac:51:05:3f:fd:0c:59:4d:6a:b9:cf:f0:7f:16: 08:9e:d4:ae:c5:db:9f:2a:07:e0:dc:90:2d:56:30:4f: a3:dd:73:8d:57:bc:d1:bc:aa:b2:9f:e9:bb:a2:c9:76 Fingerprint (MD5): B9:79:4C:0E:A2:44:34:DA:D9:5C:89:57:85:80:3E:4E Fingerprint (SHA1): CB:1F:06:98:18:B1:39:73:E9:63:1F:7E:00:02:E4:2C:2C:9E:15:35 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1531: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161483 (0x420d33cb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:14:59 2011 Not After : Tue Nov 08 16:14:59 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:bb:dc:63:05:0d:9a:b3:be:7c:46:f2:f8:df:21:84: 76:36:57:f5:eb:42:bf:ff:9f:a1:d1:64:56:e3:5e:15: 43:55:64:be:82:18:f9:4c:4f:bc:3e:ea:56:35:55:bc: 65:ce:86:df:2d:ee:fd:86:2f:5e:fa:da:c9:b1:e8:6b: 73:86:b1:3f:0e:f6:fc:b4:70:41:52:26:ca:52:24:b6: be:6f:27:81:86:63:c4:39:60:bf:b6:39:c8:28:5d:75: c3:b4:00:ab:33:ac:a0:5a:3f:06:59:2e:7f:51:a8:05: c7:9e:49:5e:de:32:96:e1:61:0e:72:43:c2:76:62:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 42:96:c4:88:cf:d7:27:4d:d4:4c:7a:9d:b5:14:dd:e5: 11:9f:83:10:c9:31:33:05:31:b4:26:66:a0:e4:6f:e0: 49:b3:4c:f3:48:3a:4d:48:40:7d:e2:d8:a9:c2:fc:c8: 06:f2:5b:21:4c:f1:ed:5c:f0:03:ec:41:b6:9f:a5:91: ed:d0:db:24:de:6c:89:e5:12:f3:1e:43:25:9e:ba:ff: 46:3f:ac:51:05:3f:fd:0c:59:4d:6a:b9:cf:f0:7f:16: 08:9e:d4:ae:c5:db:9f:2a:07:e0:dc:90:2d:56:30:4f: a3:dd:73:8d:57:bc:d1:bc:aa:b2:9f:e9:bb:a2:c9:76 Fingerprint (MD5): B9:79:4C:0E:A2:44:34:DA:D9:5C:89:57:85:80:3E:4E Fingerprint (SHA1): CB:1F:06:98:18:B1:39:73:E9:63:1F:7E:00:02:E4:2C:2C:9E:15:35 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1532: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161484 (0x420d33cc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:15:00 2011 Not After : Tue Nov 08 16:15:00 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:03:ca:9f:cb:6a:1a:21:c9:cb:b5:45:fe:9a:e2:9f: c9:f3:76:3b:ac:3e:1f:61:bf:c8:a3:0e:c5:1d:20:87: b7:f0:68:19:ed:5b:ac:ff:cb:6d:4c:75:90:05:4d:73: 97:42:18:93:f1:75:19:c4:e5:0e:47:42:d4:7f:a7:2d: 03:14:29:36:c9:23:d9:a2:6f:d4:77:9a:3c:23:75:9c: 80:72:77:d5:ed:73:08:5f:c6:aa:f3:88:4d:37:c5:c6: e1:cc:80:33:5e:fe:c7:0a:cb:32:66:9c:e3:8c:83:ed: 93:34:65:c4:04:b4:9a:dd:ef:9f:9f:8f:ee:fb:fb:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 86:20:ce:7c:32:54:79:ed:22:9b:60:85:ed:4e:58:0f: ba:2f:dc:2a:4d:a2:f4:f5:44:9b:ee:c7:ab:12:90:f8: b7:9e:ab:04:c5:84:0c:5e:a7:96:94:7c:1f:9d:75:9a: 29:5b:bc:b4:a4:57:71:7e:60:bd:a1:27:c7:00:4d:bd: 8c:9f:fa:6c:bc:6c:8f:81:4b:c1:44:2e:54:b7:df:25: 2f:9f:33:6e:76:0e:c5:1c:e9:e4:6b:98:1e:22:60:f6: c2:eb:e5:6b:5d:e0:f6:15:67:45:14:ea:19:75:08:bf: 2e:f4:80:64:31:ce:2f:a9:b5:c0:04:99:50:12:cb:53 Fingerprint (MD5): B7:D0:1C:43:FD:37:EE:56:C0:C1:AE:6F:A1:F8:4B:FD Fingerprint (SHA1): CE:0F:44:69:4D:29:6F:A2:13:68:D2:8E:BF:BB:0B:20:B8:15:26:C4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1533: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161484 (0x420d33cc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:15:00 2011 Not After : Tue Nov 08 16:15:00 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:03:ca:9f:cb:6a:1a:21:c9:cb:b5:45:fe:9a:e2:9f: c9:f3:76:3b:ac:3e:1f:61:bf:c8:a3:0e:c5:1d:20:87: b7:f0:68:19:ed:5b:ac:ff:cb:6d:4c:75:90:05:4d:73: 97:42:18:93:f1:75:19:c4:e5:0e:47:42:d4:7f:a7:2d: 03:14:29:36:c9:23:d9:a2:6f:d4:77:9a:3c:23:75:9c: 80:72:77:d5:ed:73:08:5f:c6:aa:f3:88:4d:37:c5:c6: e1:cc:80:33:5e:fe:c7:0a:cb:32:66:9c:e3:8c:83:ed: 93:34:65:c4:04:b4:9a:dd:ef:9f:9f:8f:ee:fb:fb:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 86:20:ce:7c:32:54:79:ed:22:9b:60:85:ed:4e:58:0f: ba:2f:dc:2a:4d:a2:f4:f5:44:9b:ee:c7:ab:12:90:f8: b7:9e:ab:04:c5:84:0c:5e:a7:96:94:7c:1f:9d:75:9a: 29:5b:bc:b4:a4:57:71:7e:60:bd:a1:27:c7:00:4d:bd: 8c:9f:fa:6c:bc:6c:8f:81:4b:c1:44:2e:54:b7:df:25: 2f:9f:33:6e:76:0e:c5:1c:e9:e4:6b:98:1e:22:60:f6: c2:eb:e5:6b:5d:e0:f6:15:67:45:14:ea:19:75:08:bf: 2e:f4:80:64:31:ce:2f:a9:b5:c0:04:99:50:12:cb:53 Fingerprint (MD5): B7:D0:1C:43:FD:37:EE:56:C0:C1:AE:6F:A1:F8:4B:FD Fingerprint (SHA1): CE:0F:44:69:4D:29:6F:A2:13:68:D2:8E:BF:BB:0B:20:B8:15:26:C4 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1534: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1535: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161487 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1536: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1537: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1538: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1539: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1108161488 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1540: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #1541: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1542: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1543: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161489 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1544: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1545: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1546: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1547: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1108161490 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1548: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der chains.sh: #1549: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1550: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1551: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1108161491 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1552: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #1553: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1554: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1555: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1108161492 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1556: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #1557: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1558: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1559: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1108161493 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1560: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der chains.sh: #1561: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1562: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1563: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1564: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1565: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1566: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161487 (0x420d33cf) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:02 2011 Not After : Tue Nov 08 16:15:02 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:21:15:0d:81:d3:49:8e:01:11:33:78:9b:ee:f4:60: df:98:54:a3:35:4e:02:7f:58:8d:dc:b7:87:41:fa:5d: 9d:2b:a1:61:0b:d9:f2:2f:f3:5d:0d:2e:e9:10:44:e2: f6:c4:c4:6a:71:3a:f2:fa:bf:07:40:d6:b9:39:b1:a3: 2c:9e:8d:cc:09:ec:c5:b3:6a:ad:44:55:4c:ee:f5:50: 13:f5:bd:b6:ad:9a:ae:6a:8b:f0:42:c8:81:86:1b:54: c9:36:ce:d5:9f:1d:ad:d6:c5:ad:47:2a:70:21:36:43: 38:d3:7e:8b:d9:36:6e:87:12:65:0c:cf:ff:97:5f:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 14:d3:0a:4d:d1:b3:84:2e:25:c7:24:ac:2a:bf:39:36: 27:63:d5:2d:e7:6c:fb:ae:b5:f0:55:e3:2c:28:d4:ce: 93:d9:d0:dd:9e:fa:e1:b3:c3:54:8b:13:6d:7d:68:d6: 06:22:87:34:7e:a8:ff:38:f5:e2:43:b9:1b:b4:93:9e: bc:5c:1e:89:e4:9e:1d:d9:42:41:de:b6:d8:55:93:cd: 8f:63:61:a2:d7:26:34:f7:18:9d:8f:22:73:86:c1:4b: 31:5b:c1:e4:c0:1f:b9:05:cf:26:0c:c2:d0:ee:c9:9f: 53:a2:48:6a:45:ff:ce:4e:78:0b:b5:84:4d:30:91:96 Fingerprint (MD5): BE:DE:CA:CC:8A:F2:DC:8E:F7:4C:E3:D0:A4:AC:4D:FA Fingerprint (SHA1): 68:E2:48:79:2F:66:E6:6B:5B:6A:0A:0C:92:59:2A:76:3A:FB:B8:CB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1567: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1568: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1569: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1570: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161487 (0x420d33cf) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:02 2011 Not After : Tue Nov 08 16:15:02 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:21:15:0d:81:d3:49:8e:01:11:33:78:9b:ee:f4:60: df:98:54:a3:35:4e:02:7f:58:8d:dc:b7:87:41:fa:5d: 9d:2b:a1:61:0b:d9:f2:2f:f3:5d:0d:2e:e9:10:44:e2: f6:c4:c4:6a:71:3a:f2:fa:bf:07:40:d6:b9:39:b1:a3: 2c:9e:8d:cc:09:ec:c5:b3:6a:ad:44:55:4c:ee:f5:50: 13:f5:bd:b6:ad:9a:ae:6a:8b:f0:42:c8:81:86:1b:54: c9:36:ce:d5:9f:1d:ad:d6:c5:ad:47:2a:70:21:36:43: 38:d3:7e:8b:d9:36:6e:87:12:65:0c:cf:ff:97:5f:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 14:d3:0a:4d:d1:b3:84:2e:25:c7:24:ac:2a:bf:39:36: 27:63:d5:2d:e7:6c:fb:ae:b5:f0:55:e3:2c:28:d4:ce: 93:d9:d0:dd:9e:fa:e1:b3:c3:54:8b:13:6d:7d:68:d6: 06:22:87:34:7e:a8:ff:38:f5:e2:43:b9:1b:b4:93:9e: bc:5c:1e:89:e4:9e:1d:d9:42:41:de:b6:d8:55:93:cd: 8f:63:61:a2:d7:26:34:f7:18:9d:8f:22:73:86:c1:4b: 31:5b:c1:e4:c0:1f:b9:05:cf:26:0c:c2:d0:ee:c9:9f: 53:a2:48:6a:45:ff:ce:4e:78:0b:b5:84:4d:30:91:96 Fingerprint (MD5): BE:DE:CA:CC:8A:F2:DC:8E:F7:4C:E3:D0:A4:AC:4D:FA Fingerprint (SHA1): 68:E2:48:79:2F:66:E6:6B:5B:6A:0A:0C:92:59:2A:76:3A:FB:B8:CB Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1571: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1572: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1573: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161494 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1574: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1575: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1576: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1577: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1108161495 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1578: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #1579: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1580: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1581: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1108161496 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1582: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der chains.sh: #1583: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1584: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1585: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1108161497 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1586: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der chains.sh: #1587: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1588: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1589: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1108161498 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1590: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der chains.sh: #1591: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1592: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1593: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1108161499 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1594: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der chains.sh: #1595: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1596: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1108161500 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der chains.sh: #1599: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1600: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1601: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1108161501 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der chains.sh: #1603: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1604: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1108161502 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1606: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der chains.sh: #1607: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1608: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1108161503 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der chains.sh: #1611: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1612: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1613: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1108161504 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1614: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der chains.sh: #1615: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1616: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1617: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1108161505 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1618: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der chains.sh: #1619: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1620: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1621: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1108161506 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1622: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der chains.sh: #1623: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1624: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1625: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1108161507 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1626: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der chains.sh: #1627: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1628: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1629: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1108161508 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1630: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der chains.sh: #1631: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1632: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1633: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1108161509 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1634: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der chains.sh: #1635: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1636: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1637: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1108161510 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1638: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der chains.sh: #1639: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1640: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1641: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1108161511 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1642: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der chains.sh: #1643: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1644: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1645: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1108161512 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1646: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der chains.sh: #1647: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1648: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1649: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1108161513 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1650: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der chains.sh: #1651: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1652: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1653: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1108161514 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1654: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der chains.sh: #1655: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1656: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1657: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1108161515 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1658: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der chains.sh: #1659: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1660: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1661: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1108161516 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1662: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der chains.sh: #1663: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1664: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1665: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1108161517 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1666: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der chains.sh: #1667: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1668: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1669: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1108161518 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1670: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der chains.sh: #1671: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1672: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1673: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1108161519 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1674: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der chains.sh: #1675: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1676: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1677: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1108161520 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1678: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der chains.sh: #1679: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1680: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1681: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1108161521 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1682: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der chains.sh: #1683: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1684: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1685: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1108161522 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1686: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der chains.sh: #1687: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1688: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1689: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1108161523 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1690: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der chains.sh: #1691: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1692: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1693: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1694: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1695: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1696: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1697: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1698: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1699: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1700: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1701: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1702: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1703: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1704: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1705: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1706: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1707: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1708: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1709: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1710: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1711: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1712: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1713: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1714: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161494 (0x420d33d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:15:05 2011 Not After : Tue Nov 08 16:15:05 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:bd:c8:a5:d8:73:59:88:9b:3f:f2:ff:86:6c:38:8e: c2:72:de:5e:9a:6f:d2:bd:ce:a5:f5:45:5e:2c:12:14: 9b:46:e1:c2:b1:03:37:00:52:0b:12:7b:97:40:c3:a3: 5c:94:94:26:e3:63:25:71:5a:f3:5f:20:8f:50:da:73: 12:ba:70:5c:d5:ab:bb:42:a3:83:b5:83:81:25:4d:77: 5e:2d:6e:fb:4a:84:d6:e9:17:8a:e5:6f:86:c3:af:df: 06:cb:16:d5:79:9c:33:a2:ae:af:48:32:cb:46:40:df: a0:31:a3:09:f3:ff:5c:d4:2e:76:e6:00:41:17:df:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:c1:13:53:48:2d:8c:9f:34:32:8f:b2:71:4a:39:a5: 3a:56:25:8e:17:30:dd:d9:47:da:cb:37:71:98:9f:67: a3:fc:f7:9b:a2:f4:20:a7:bd:c7:29:14:eb:b1:6e:ad: 04:f9:32:f5:5b:4d:44:87:13:ff:cb:74:e7:0d:dd:12: 28:ab:21:ab:2c:c3:53:1c:50:a2:9c:81:7f:4c:42:02: 0d:e7:26:48:20:80:a6:d0:2d:a8:13:5e:e4:ee:93:33: b6:17:fb:18:d3:96:d3:08:13:01:75:f8:42:c3:ab:69: 3b:75:28:9b:05:a8:c7:4d:27:a3:c8:31:5d:88:31:d1 Fingerprint (MD5): EE:43:A8:9D:45:8A:CC:61:2A:B1:00:5F:E8:09:89:39 Fingerprint (SHA1): D2:97:85:FE:88:D8:E1:A5:D0:D6:73:AB:6D:C3:06:61:78:E2:99:9F Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1715: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1716: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1717: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161524 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1718: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1719: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1720: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1721: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1108161525 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1722: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der chains.sh: #1723: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1724: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1725: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1108161526 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1726: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der chains.sh: #1727: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1728: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1729: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1108161527 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1730: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der chains.sh: #1731: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1732: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1733: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1108161528 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der chains.sh: #1735: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1736: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1737: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1108161529 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der chains.sh: #1739: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1740: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1741: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1108161530 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der chains.sh: #1743: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1744: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161524 (0x420d33f4) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:15 2011 Not After : Tue Nov 08 16:15:15 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:22:c3:59:ac:1e:cd:99:62:ea:a3:3a:4f:88:17:ae: ba:d9:f6:27:48:55:e1:82:ed:c3:5e:75:71:04:cc:25: 0f:37:59:1f:b7:6f:42:27:fe:09:e7:c5:1a:95:b8:55: dd:eb:84:c6:9d:f2:27:ba:e2:6e:72:9c:dc:7d:32:0a: 98:ae:a2:51:85:86:2e:c2:59:04:b5:01:bc:0c:ca:b3: c2:db:b7:79:38:6d:2d:e4:55:36:cc:6d:ed:60:7b:22: c7:44:45:3b:44:96:ed:eb:00:5c:f3:a7:92:aa:41:c9: 53:24:6e:8a:b2:c3:8c:81:65:74:1e:59:ca:80:2b:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 90:8a:44:33:63:79:39:a2:ea:56:48:7e:e1:aa:e8:36: 27:7d:a3:97:04:00:1b:8a:68:cf:df:19:2f:62:f8:0d: fb:9a:1d:e1:00:3c:ec:09:6c:22:7d:f1:f9:78:c5:90: 8b:4c:0f:3c:9e:cd:2e:70:2a:52:63:0a:f1:e2:c8:4d: 49:f4:99:af:9d:21:16:52:aa:b2:a7:ac:8c:2b:7e:8d: e1:84:82:fd:f0:56:48:9b:ce:82:44:b8:41:0c:92:a7: 00:c7:5a:97:05:96:99:38:63:5b:22:f3:19:69:3d:a9: d8:a2:85:95:06:cc:71:3e:40:9f:8a:93:e0:0c:a0:12 Fingerprint (MD5): DE:3C:A4:B5:0C:BB:ED:F3:CC:FF:DF:7A:0E:7F:FA:DA Fingerprint (SHA1): 33:C8:4C:93:A1:AB:ED:AC:B4:14:83:57:4E:AF:66:24:AB:0F:49:61 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1745: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1746: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1747: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1748: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161524 (0x420d33f4) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:15 2011 Not After : Tue Nov 08 16:15:15 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:22:c3:59:ac:1e:cd:99:62:ea:a3:3a:4f:88:17:ae: ba:d9:f6:27:48:55:e1:82:ed:c3:5e:75:71:04:cc:25: 0f:37:59:1f:b7:6f:42:27:fe:09:e7:c5:1a:95:b8:55: dd:eb:84:c6:9d:f2:27:ba:e2:6e:72:9c:dc:7d:32:0a: 98:ae:a2:51:85:86:2e:c2:59:04:b5:01:bc:0c:ca:b3: c2:db:b7:79:38:6d:2d:e4:55:36:cc:6d:ed:60:7b:22: c7:44:45:3b:44:96:ed:eb:00:5c:f3:a7:92:aa:41:c9: 53:24:6e:8a:b2:c3:8c:81:65:74:1e:59:ca:80:2b:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 90:8a:44:33:63:79:39:a2:ea:56:48:7e:e1:aa:e8:36: 27:7d:a3:97:04:00:1b:8a:68:cf:df:19:2f:62:f8:0d: fb:9a:1d:e1:00:3c:ec:09:6c:22:7d:f1:f9:78:c5:90: 8b:4c:0f:3c:9e:cd:2e:70:2a:52:63:0a:f1:e2:c8:4d: 49:f4:99:af:9d:21:16:52:aa:b2:a7:ac:8c:2b:7e:8d: e1:84:82:fd:f0:56:48:9b:ce:82:44:b8:41:0c:92:a7: 00:c7:5a:97:05:96:99:38:63:5b:22:f3:19:69:3d:a9: d8:a2:85:95:06:cc:71:3e:40:9f:8a:93:e0:0c:a0:12 Fingerprint (MD5): DE:3C:A4:B5:0C:BB:ED:F3:CC:FF:DF:7A:0E:7F:FA:DA Fingerprint (SHA1): 33:C8:4C:93:A1:AB:ED:AC:B4:14:83:57:4E:AF:66:24:AB:0F:49:61 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1749: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1750: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1751: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1752: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161531 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1753: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1754: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1755: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1756: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161532 --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1757: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1758: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1759: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1760: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161533 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1761: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1762: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1763: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1764: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1108161534 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1765: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #1766: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1767: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1768: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1769: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1770: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161531 (0x420d33fb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:18 2011 Not After : Tue Nov 08 16:15:18 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:22:de:50:b0:5f:fe:3b:c5:a2:e5:68:17:12:a0:ad: ed:1f:63:0f:c8:fa:ab:c3:a5:b4:64:0a:ce:af:53:26: 34:4e:8b:16:fa:24:e3:f8:d1:ef:53:82:11:ea:cb:01: 6d:ea:29:da:06:b1:52:9c:85:56:de:94:90:b0:74:b7: d9:5d:58:4b:72:05:dc:66:1a:b5:c9:7a:3e:cb:00:3c: 5b:74:a5:4a:ff:f5:bb:b4:61:7c:75:89:be:f6:cb:33: 89:d5:bd:dc:c7:00:b3:7b:30:a8:9f:b2:6b:d4:bb:45: ef:0e:08:65:67:65:f9:51:51:d6:57:8d:f9:d5:aa:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5e:6d:86:51:88:4c:6e:75:03:bb:bc:e4:7b:50:85:40: 17:3b:3e:d0:23:65:f1:24:fe:3e:ec:9a:2f:12:0b:03: 6a:64:57:f1:de:3d:ba:74:16:51:6d:47:53:cc:e4:83: 40:3c:9f:35:da:6b:be:e2:79:32:cb:de:3f:0a:70:fa: 12:b2:65:3b:1d:cc:67:9b:f3:37:a6:f2:d9:a6:be:95: f0:4a:87:8f:19:50:99:22:62:c4:1b:61:d8:88:b3:df: 8c:a2:eb:3f:d9:d1:49:aa:0f:fe:5c:f8:31:07:24:50: d5:cc:ee:ac:a9:88:9c:08:d5:8c:f2:8b:f6:8a:17:88 Fingerprint (MD5): 08:8F:21:E2:5E:61:06:E4:1E:6B:37:98:59:EA:D1:E9 Fingerprint (SHA1): 2D:8D:DD:01:60:CB:2B:17:59:66:18:91:66:51:FC:26:1D:D7:7B:1B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1771: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1772: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1773: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161532 (0x420d33fc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:18 2011 Not After : Tue Nov 08 16:15:18 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:47:90:0c:4a:b2:a9:ee:0b:d4:f0:ae:84:a8:ba:a1: 08:97:b3:50:84:9e:cf:a5:d9:8c:82:cb:df:41:ce:f8: 08:2a:b7:4a:da:43:70:8c:45:eb:d0:35:b2:83:fe:8d: 77:c9:29:4b:f1:67:86:59:a0:3d:bc:a9:18:40:0f:8f: 41:4f:75:6c:05:1a:2c:b9:e6:0e:4b:80:bf:da:6b:d6: b7:06:e3:da:ad:6a:f1:c4:51:3b:ef:19:1e:eb:55:87: 0c:ab:dc:61:22:72:b8:cf:4a:f0:81:33:16:23:84:0c: 93:fc:a7:11:b0:a7:31:65:1a:7f:ff:c0:79:65:49:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:fb:98:bc:ad:6f:7d:3f:cb:b8:5c:d3:6f:a5:93:04: 72:9a:ac:51:d7:f9:d9:bc:45:c9:5f:56:8f:8d:c6:97: e7:2b:a5:b5:93:40:8f:6d:9d:c6:b2:5e:c8:4e:a7:d4: 5f:71:08:3b:89:eb:9c:6f:b8:fd:84:82:e5:36:73:84: c1:51:4e:88:4f:0b:aa:5d:a5:55:30:0b:7d:96:74:24: 5e:cd:58:fd:83:91:04:b5:cd:25:31:78:b0:0f:45:de: 8c:60:5e:ee:c6:5f:2c:9c:a3:80:e1:bf:ce:65:b9:04: d6:ed:10:2a:f8:ad:d3:68:82:98:5d:d1:a7:04:f6:4a Fingerprint (MD5): C5:C7:BB:96:3B:C6:BE:08:08:30:9A:62:66:17:4B:9F Fingerprint (SHA1): 63:F4:C1:5B:0F:52:6F:66:9A:11:90:51:BE:C5:F8:A8:02:C5:13:50 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1774: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1775: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161533 (0x420d33fd) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:15:18 2011 Not After : Tue Nov 08 16:15:18 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:d9:7f:e2:78:69:50:a1:79:fe:ab:7b:0b:37:1c:e4: bd:98:90:69:ff:66:26:ca:3f:58:d2:c3:5a:f0:61:ec: 74:95:f2:af:8c:24:4e:d5:f6:9e:4d:f5:50:0d:07:03: f8:cb:ad:59:af:1c:74:aa:90:07:f1:ba:a0:50:db:bd: 0d:60:22:c2:b1:43:7e:22:9c:ee:49:29:33:65:ee:28: ec:10:2e:50:ea:53:bb:51:e8:89:f9:ae:72:d4:33:ef: a7:3b:48:87:c0:cc:ea:f3:26:e5:00:f2:e1:59:4c:b2: 22:65:f4:e4:a1:dc:39:94:a9:da:53:f6:00:63:07:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: d0:e7:1b:0d:3e:b1:a0:d8:75:36:0e:80:77:82:03:e5: 90:d1:cf:31:6c:a0:bd:83:1d:98:fd:bc:f8:c8:c2:28: 25:5c:98:45:6c:25:c5:48:bb:5d:02:7d:4c:69:47:10: 32:19:98:50:59:ee:31:50:2f:45:b2:53:17:2b:e9:6c: 44:f9:99:4f:9e:cd:d6:2e:27:d6:6a:2c:0e:f9:3c:a0: 89:fa:19:f6:d1:a3:1a:2b:7d:d1:95:6e:23:59:7f:f6: cd:79:d6:a6:d3:67:a2:58:0a:f8:32:43:72:72:d4:48: 12:ee:ee:20:3c:05:86:4f:e0:7b:4a:65:45:e9:73:65 Fingerprint (MD5): B4:2D:F6:4C:07:47:75:A7:F3:B1:8C:75:34:53:5F:2C Fingerprint (SHA1): 6E:6B:AE:3F:63:5D:82:40:EE:5A:45:CB:85:28:D7:21:BA:5A:BF:63 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1776: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1777: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161535 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1778: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1779: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1780: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1781: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161536 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1782: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1783: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1784: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1785: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161537 --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1786: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1787: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1788: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1108161538 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1790: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der chains.sh: #1791: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1792: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1793: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1108161539 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1794: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der chains.sh: #1795: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1796: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1797: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1798: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1799: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1800: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161535 (0x420d33ff) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:19 2011 Not After : Tue Nov 08 16:15:19 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:f0:da:94:e9:cf:4e:c1:fb:fb:47:07:48:f0:ed:e1: 6e:be:d8:0b:43:37:b4:fd:7a:02:52:8d:33:58:78:65: 27:11:6f:3b:92:99:39:f3:74:0f:cd:4a:91:b2:f6:33: 07:1f:2d:75:69:f6:f1:7f:0c:65:3c:67:47:e8:01:35: 3f:90:2c:e9:9a:0e:ee:83:5d:30:ec:82:75:c5:5d:89: f8:c2:23:b5:2b:82:1f:3b:a2:ac:9f:aa:ef:5b:c8:f8: 1c:45:bb:0f:c2:15:d2:7b:3e:bc:18:8c:45:8d:4b:9e: 51:88:fa:ef:72:ec:5e:2c:03:35:b0:ae:fd:35:50:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:de:83:e7:ee:78:45:fc:1f:a9:b6:48:e4:db:ee:fd: 21:13:26:41:54:1f:53:b2:0c:fe:3d:4f:92:8f:b7:cb: 95:31:10:16:53:06:88:fc:ca:5c:4e:00:96:51:ad:c9: e5:5b:0a:fa:2b:ee:d4:5b:2f:d0:b1:94:98:f8:30:8b: 99:db:ef:51:8b:88:9d:c9:95:42:63:05:2b:5e:83:cf: 17:6d:62:95:aa:8d:b2:2b:9a:f8:d6:4d:75:9d:83:61: ca:44:aa:5e:76:c5:d7:5c:fe:90:6c:b3:ef:c5:88:62: 81:86:1e:7a:a7:1f:56:ea:b0:05:36:e8:9d:10:0e:ed Fingerprint (MD5): B2:0A:42:66:D0:0A:AA:DC:A4:C7:5A:91:EA:57:48:4C Fingerprint (SHA1): 9F:F5:9D:2C:F4:08:59:8A:8D:35:55:DC:98:26:35:FB:3A:A9:4C:A3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1802: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161536 (0x420d3400) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:20 2011 Not After : Tue Nov 08 16:15:20 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:4a:0d:a3:8b:1f:f6:ef:b2:3f:08:89:a6:87:81: 1c:cf:07:09:e3:de:35:e6:ee:3a:3d:cf:d8:0d:c2:4c: 66:c4:38:66:71:28:87:6a:07:5e:a8:a0:52:d4:53:af: 63:1e:6a:24:34:56:2e:2d:6c:dc:73:bf:5d:f5:22:d5: b8:4a:fb:ae:66:97:fc:a4:0b:8a:97:7f:b9:fb:9c:1a: e5:77:08:f8:56:a0:9f:f9:ce:30:21:c0:a2:86:50:36: 8e:87:f8:72:b2:b6:da:23:b2:eb:37:41:8e:11:00:64: e7:09:86:c7:52:1c:4a:22:39:a5:ac:74:64:95:e1:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: aa:58:82:8d:ff:80:76:c0:48:0c:33:78:87:5a:13:54: 8b:d6:c7:c5:63:04:94:83:47:51:63:e8:1a:32:bd:73: 72:93:93:00:3f:a0:a9:55:34:85:aa:e0:6a:22:64:14: 66:5f:94:0a:db:55:38:c3:f9:57:1f:08:53:c9:21:56: ae:c8:46:4e:76:a4:6e:d7:c8:0f:e1:ae:9f:45:f3:64: 41:b8:01:9c:40:42:f7:df:c2:67:36:dc:ac:7f:6a:4f: a0:ca:ce:2c:66:6f:2b:b7:73:12:35:21:93:60:c6:b9: e8:c6:3e:c4:2f:c2:7a:75:3a:a5:27:c6:59:4e:e2:91 Fingerprint (MD5): 0F:2D:4F:BA:E8:7F:21:F6:6E:DC:2B:F0:CE:41:72:E3 Fingerprint (SHA1): EC:E5:EF:D2:06:F9:9D:2E:A0:9E:3D:1A:BD:EF:13:1A:02:B5:B4:70 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1803: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1804: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1805: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161537 (0x420d3401) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:15:20 2011 Not After : Tue Nov 08 16:15:20 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:0f:b6:5a:09:83:0e:a8:a5:14:6e:10:0c:a2:13:86: dc:1a:a7:99:8f:cc:30:d9:c9:2a:1b:d7:92:d2:04:88: cd:38:ef:42:85:c9:65:0b:29:75:f6:17:70:0c:11:ee: 92:c6:52:d9:e8:4f:b9:c4:fa:78:98:94:80:1d:3e:0a: 2a:25:db:88:4b:71:2b:d4:c0:15:a4:19:68:4d:2c:b2: 70:69:06:b7:a6:ed:50:8a:a4:8e:c9:c0:c0:8d:78:23: 02:10:44:2d:c9:3e:fb:52:6c:8c:4d:4f:27:30:5b:60: d0:57:25:1b:7e:7a:8a:00:53:cd:f7:b1:81:27:cf:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:7e:f0:e1:47:43:fb:f6:bd:f5:6e:19:1b:81:89:d8: e9:78:35:78:f4:53:64:88:f2:95:95:05:fa:df:a3:4f: 99:a5:00:c0:07:14:13:5a:18:6c:cf:c6:e5:83:f5:e4: 63:94:f2:dc:90:dd:4e:48:99:f7:45:ec:82:f5:1b:ed: c3:f2:bf:f7:be:87:7e:5a:1a:e5:90:29:b6:8e:54:6c: 60:76:ab:b2:b9:ab:81:0a:8d:48:01:df:eb:36:97:65: ab:37:18:b9:6e:bb:a6:02:66:93:c5:2f:9d:38:9c:47: 07:47:32:85:b1:da:d9:66:33:a7:18:a8:cc:f4:24:72 Fingerprint (MD5): 13:93:DF:A1:99:59:F6:AF:78:54:B6:76:69:29:22:F8 Fingerprint (SHA1): 58:6B:52:BD:50:15:DD:96:5B:8B:DD:EF:F7:9E:31:8E:6A:EE:EA:AE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1806: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1807: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161540 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1808: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1809: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1810: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1811: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161541 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1812: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1813: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1814: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1815: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161542 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-CA1Root-1108161450.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1816: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #1817: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1818: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1819: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1108161543 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1820: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #1821: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1822: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1823: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161544 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1824: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1825: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1826: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161545 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1827: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1828: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1829: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1830: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1108161546 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1831: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #1832: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1108161547 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1833: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #1834: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1835: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1836: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1837: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1108161548 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-Bridge-1108161451.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1838: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #1839: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1840: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1841: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161549 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1842: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1843: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1844: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1845: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161550 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1846: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1847: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1848: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161551 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1849: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1850: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1851: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1852: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1108161552 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1853: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #1854: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1108161553 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1855: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #1856: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1857: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1858: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1859: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1108161554 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-Bridge-1108161452.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1860: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #1861: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1862: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1863: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161555 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1864: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1865: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1866: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1867: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1108161556 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-BridgeNavy-1108161453.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1868: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #1869: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1870: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1871: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1108161557 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1872: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #1873: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1874: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1875: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161558 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1876: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1877: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1878: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161559 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1879: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1880: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1881: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1882: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1108161560 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1883: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der chains.sh: #1884: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1885: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1886: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1108161561 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1887: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der chains.sh: #1888: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1889: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1890: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1108161562 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1891: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der chains.sh: #1892: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1108161563 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1893: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der chains.sh: #1894: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1895: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1896: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1897: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1108161564 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1898: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #1899: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1900: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1901: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1108161565 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1902: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #1903: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1904: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1905: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161566 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1906: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1907: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1908: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1909: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1108161567 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1910: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #1911: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1912: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161558 (0x420d3416) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:15:26 2011 Not After : Tue Nov 08 16:15:26 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:96:02:15:3f:f4:52:4d:9e:ef:f8:1e:98:f3:fa:eb: d1:d4:98:06:bb:2e:5e:2d:6a:f5:e2:9d:08:95:c9:38: e1:46:4c:80:d0:b3:8b:b0:44:c3:70:4b:87:37:10:c1: 3a:e9:f5:62:c6:3a:81:8c:40:e8:5d:c2:17:99:8f:45: 15:55:c9:72:82:30:4a:26:3b:b3:2e:60:d7:d9:d9:74: 01:8c:e7:9b:de:8a:3f:dd:ba:5c:9d:66:8e:34:f8:3c: 53:74:a0:07:78:0b:a5:15:91:07:a2:08:1d:64:6b:0b: 36:8a:f0:a5:3b:2c:47:95:d4:4f:41:e9:bc:87:81:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 04:99:0c:ea:79:27:8b:ee:9a:7f:84:22:e7:c2:1f:22: c4:00:f6:85:bf:0e:16:0b:a4:b1:97:b7:9a:85:f4:2c: 80:12:89:7d:63:e9:b9:f1:8c:5c:64:5e:57:ea:28:b9: b0:af:71:6e:49:d5:bf:ba:ea:fe:f1:aa:03:86:38:fa: 64:58:1a:5b:6f:65:fd:af:af:46:00:79:42:74:56:ae: e2:52:ff:6f:bb:96:0e:9c:81:f1:61:83:df:dd:9a:3b: 68:b4:ea:0c:18:27:46:59:40:fa:de:f6:bb:aa:ec:a4: c1:ee:41:63:64:9e:79:7e:c3:c3:51:c2:a0:1c:c9:24 Fingerprint (MD5): DD:AE:6E:72:B0:99:DA:C8:BF:B8:20:7B:25:72:C3:82 Fingerprint (SHA1): 9D:2B:94:3D:2C:FB:08:03:AF:89:D4:06:C1:2C:64:59:05:B9:47:C0 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1913: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1914: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1915: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1916: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1917: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1918: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1919: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1920: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1921: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161559 (0x420d3417) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:15:27 2011 Not After : Tue Nov 08 16:15:27 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:6f:4c:a6:8d:c9:e9:5d:5a:c8:bd:5f:53:81:a2:d2: 6f:c8:aa:58:82:0e:69:a0:97:3b:d3:d3:e3:f0:cd:ef: e3:32:d6:8e:91:32:40:d9:1d:78:72:b2:ef:42:7e:85: a9:2f:cd:c0:a0:ba:a4:ab:9f:20:fc:3f:e4:04:3f:31: f6:5d:6f:41:6c:57:94:01:51:d7:e0:51:bd:78:69:10: 3f:9b:dc:41:06:55:02:40:45:ac:9e:60:49:39:15:87: cf:b5:68:c6:fb:c8:5a:0a:c8:fa:1c:6d:40:e7:fb:da: f2:3b:b5:0d:e7:ae:dd:63:c7:49:8f:62:94:a8:f8:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6f:c9:6b:bc:c9:b3:66:b7:47:2e:ca:1f:6a:7a:c6:75: fa:d8:0a:67:e4:e2:17:fb:0b:79:06:21:6e:02:b4:3b: 0b:32:03:ab:85:32:d6:c6:88:2f:ac:42:83:25:cf:69: 27:51:b5:1f:01:2a:af:8c:de:d9:88:25:b2:6d:e8:d2: 80:39:dd:3a:d5:e3:55:c6:a6:79:b0:01:01:eb:d4:16: 5a:85:4a:46:c5:11:d9:20:71:ad:70:0d:6b:80:54:64: 47:a2:0e:7b:49:53:84:af:79:df:34:80:87:24:1c:c3: 4c:af:d3:6b:02:07:4d:f9:a1:f4:73:35:4e:3d:47:1e Fingerprint (MD5): F3:44:1C:C0:1F:AA:CE:7E:27:71:86:55:6A:43:08:2F Fingerprint (SHA1): 59:D1:46:C9:99:5E:29:61:CC:A5:13:5E:9D:14:8C:C0:9E:23:F4:15 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1922: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1923: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1924: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1925: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1926: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1927: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1928: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1929: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1930: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1931: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1932: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1933: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1934: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1935: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1936: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1937: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig n, Inc.",C=US" Validity: Not Before: Wed Nov 08 00:00:00 2006 Not After : Sun Nov 07 23:59:59 2021 Subject: "CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve riSign Trust Network,O="VeriSign, Inc.",C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: CRL Distribution Points Distribution point: URI: "http://crl.verisign.com/pca3.crl" Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: OID.1.3.6.1.5.5.7.1.12 Data: Sequence { [1]: { [0]: { Sequence { Sequence { Sequence { "image/gif" Sequence { Sequence { Sequence { SHA-1 } 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: 80:6a:d4:48:18:2c:7b:19:2e } } Sequence { "http://logo.verisign.com/vslogo.gif" } } } } } } } Name: Certificate Policies Data: Policy Name: Certificate Policies AnyPolicy Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Qualifier Data: "https://www.verisign.com/cps" Name: Certificate Subject Key ID Data: 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: af:33:31:33 Name: Certificate Authority Key Identifier Issuer: Directory Name: "OU=Class 3 Public Primary Certification Auth ority,O="VeriSign, Inc.",C=US" Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 Fingerprint (MD5): C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C Fingerprint (SHA1): 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= US,serialNumber=3014267,businessCategory=Private Organization,incorporati onState=Delaware,incorporationCountry=US" Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network ,O="VeriSign, Inc.",C=US" Returned value is 0, expected result is pass chains.sh: #1938: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1939: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1940: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161568 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1941: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1942: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1943: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1944: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161569 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1945: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #1946: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1947: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1948: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161570 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1949: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #1950: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1951: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1952: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1108161571 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1953: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der chains.sh: #1954: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1955: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1956: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1108161572 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1957: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #1958: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1959: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1960: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1108161573 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1961: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der chains.sh: #1962: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1963: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1964: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1108161574 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1965: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der chains.sh: #1966: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1967: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1968: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1108161575 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1969: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der chains.sh: #1970: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1971: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1972: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1108161576 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1973: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der chains.sh: #1974: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1975: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161568 (0x420d3420) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:31 2011 Not After : Tue Nov 08 16:15:31 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 6d:14:f3:ef:f2:be:c7:65:29:ec:f8:f6:44:78:c2:85: 70:62:63:b8:37:97:40:46:ec:80:c0:25:99:55:35:d7: b3:b5:a8:f0:e0:e6:e0:da:09:49:bb:45:20:73:90:85: 1a:20:a1:f6:96:7f:56:22:9a:27:15:c1:1c:57:6d:62: aa:21:67:24:d2:88:62:71:4f:c7:dc:59:1c:d6:81:40: 27:88:10:d8:ef:c9:fb:32:78:fd:20:df:e9:7f:b0:ad: ee:81:63:c3:d8:99:62:eb:9b:3f:84:72:97:bd:34:12: 0a:13:c3:f2:ff:81:4a:91:3a:72:ab:fe:88:57:ef:5a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:11:90:96:34:c2:f4:f9:0a:fd:6a:f1:6e: f8:20:fe:d0:ef:c7:13:32:02:14:01:44:75:18:7f:c0: 73:2e:cd:e8:ef:fa:f6:3c:51:1d:90:5c:83:9d Fingerprint (MD5): B7:A4:B0:D7:0F:FD:A2:CB:68:62:FD:DF:71:F1:D9:65 Fingerprint (SHA1): FF:E9:D5:52:6A:9C:23:13:95:FD:09:5A:87:5A:25:A9:3B:21:52:CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1976: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161568 (0x420d3420) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:31 2011 Not After : Tue Nov 08 16:15:31 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 6d:14:f3:ef:f2:be:c7:65:29:ec:f8:f6:44:78:c2:85: 70:62:63:b8:37:97:40:46:ec:80:c0:25:99:55:35:d7: b3:b5:a8:f0:e0:e6:e0:da:09:49:bb:45:20:73:90:85: 1a:20:a1:f6:96:7f:56:22:9a:27:15:c1:1c:57:6d:62: aa:21:67:24:d2:88:62:71:4f:c7:dc:59:1c:d6:81:40: 27:88:10:d8:ef:c9:fb:32:78:fd:20:df:e9:7f:b0:ad: ee:81:63:c3:d8:99:62:eb:9b:3f:84:72:97:bd:34:12: 0a:13:c3:f2:ff:81:4a:91:3a:72:ab:fe:88:57:ef:5a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:11:90:96:34:c2:f4:f9:0a:fd:6a:f1:6e: f8:20:fe:d0:ef:c7:13:32:02:14:01:44:75:18:7f:c0: 73:2e:cd:e8:ef:fa:f6:3c:51:1d:90:5c:83:9d Fingerprint (MD5): B7:A4:B0:D7:0F:FD:A2:CB:68:62:FD:DF:71:F1:D9:65 Fingerprint (SHA1): FF:E9:D5:52:6A:9C:23:13:95:FD:09:5A:87:5A:25:A9:3B:21:52:CA Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1977: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161568 (0x420d3420) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:31 2011 Not After : Tue Nov 08 16:15:31 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 6d:14:f3:ef:f2:be:c7:65:29:ec:f8:f6:44:78:c2:85: 70:62:63:b8:37:97:40:46:ec:80:c0:25:99:55:35:d7: b3:b5:a8:f0:e0:e6:e0:da:09:49:bb:45:20:73:90:85: 1a:20:a1:f6:96:7f:56:22:9a:27:15:c1:1c:57:6d:62: aa:21:67:24:d2:88:62:71:4f:c7:dc:59:1c:d6:81:40: 27:88:10:d8:ef:c9:fb:32:78:fd:20:df:e9:7f:b0:ad: ee:81:63:c3:d8:99:62:eb:9b:3f:84:72:97:bd:34:12: 0a:13:c3:f2:ff:81:4a:91:3a:72:ab:fe:88:57:ef:5a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:11:90:96:34:c2:f4:f9:0a:fd:6a:f1:6e: f8:20:fe:d0:ef:c7:13:32:02:14:01:44:75:18:7f:c0: 73:2e:cd:e8:ef:fa:f6:3c:51:1d:90:5c:83:9d Fingerprint (MD5): B7:A4:B0:D7:0F:FD:A2:CB:68:62:FD:DF:71:F1:D9:65 Fingerprint (SHA1): FF:E9:D5:52:6A:9C:23:13:95:FD:09:5A:87:5A:25:A9:3B:21:52:CA Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1978: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161568 (0x420d3420) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:31 2011 Not After : Tue Nov 08 16:15:31 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 6d:14:f3:ef:f2:be:c7:65:29:ec:f8:f6:44:78:c2:85: 70:62:63:b8:37:97:40:46:ec:80:c0:25:99:55:35:d7: b3:b5:a8:f0:e0:e6:e0:da:09:49:bb:45:20:73:90:85: 1a:20:a1:f6:96:7f:56:22:9a:27:15:c1:1c:57:6d:62: aa:21:67:24:d2:88:62:71:4f:c7:dc:59:1c:d6:81:40: 27:88:10:d8:ef:c9:fb:32:78:fd:20:df:e9:7f:b0:ad: ee:81:63:c3:d8:99:62:eb:9b:3f:84:72:97:bd:34:12: 0a:13:c3:f2:ff:81:4a:91:3a:72:ab:fe:88:57:ef:5a Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2c:02:14:11:90:96:34:c2:f4:f9:0a:fd:6a:f1:6e: f8:20:fe:d0:ef:c7:13:32:02:14:01:44:75:18:7f:c0: 73:2e:cd:e8:ef:fa:f6:3c:51:1d:90:5c:83:9d Fingerprint (MD5): B7:A4:B0:D7:0F:FD:A2:CB:68:62:FD:DF:71:F1:D9:65 Fingerprint (SHA1): FF:E9:D5:52:6A:9C:23:13:95:FD:09:5A:87:5A:25:A9:3B:21:52:CA Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1979: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1980: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #1981: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1982: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1983: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1984: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1985: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #1986: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1987: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1988: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1989: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #1990: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1991: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1992: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1993: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #1994: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1995: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #1996: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1997: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der chains.sh: #1998: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1999: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2000: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2001: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #2002: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2003: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2004: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2005: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #2006: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20111108161535Z nextupdate=20121108161535Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Nov 08 16:15:35 2011 Next Update: Thu Nov 08 16:15:35 2012 CRL Extensions: chains.sh: #2007: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161535Z nextupdate=20121108161535Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:15:35 2011 Next Update: Thu Nov 08 16:15:35 2012 CRL Extensions: chains.sh: #2008: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20111108161535Z nextupdate=20121108161535Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Nov 08 16:15:35 2011 Next Update: Thu Nov 08 16:15:35 2012 CRL Extensions: chains.sh: #2009: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20111108161535Z nextupdate=20121108161535Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Nov 08 16:15:35 2011 Next Update: Thu Nov 08 16:15:35 2012 CRL Extensions: chains.sh: #2010: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20111108161536Z addcert 14 20111108161536Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Nov 08 16:15:36 2011 Next Update: Thu Nov 08 16:15:35 2012 Entry (1): Serial Number: 14 (0xe) Revocation Date: Tue Nov 08 16:15:36 2011 CRL Extensions: chains.sh: #2011: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161537Z addcert 15 20111108161537Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:15:37 2011 Next Update: Thu Nov 08 16:15:35 2012 Entry (1): Serial Number: 15 (0xf) Revocation Date: Tue Nov 08 16:15:37 2011 CRL Extensions: chains.sh: #2012: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2013: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2014: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2015: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #2016: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #2017: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #2018: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #2019: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #2020: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #2021: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:33 2011 Not After : Tue Nov 08 16:15:33 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:19:ba:ae:90:83:82:34:3a:86:ad:01:9f:04:07:2f: c8:ae:a4:82:f8:fb:81:7f:e6:10:cd:24:7d:61:4c:2f: 90:7f:ba:24:24:73:1e:3d:e8:39:2c:a5:85:19:b2:28: 68:6a:d7:9b:e0:e2:ac:c5:37:a9:40:30:a4:56:36:08: b6:81:eb:90:50:ff:c4:01:91:c1:75:3f:42:1a:d6:f3: 10:29:46:ee:6e:5d:2c:11:8e:2a:e4:cb:bf:00:d3:e6: 79:e9:8a:af:c5:d8:12:d3:8b:f0:d1:04:7b:66:67:b5: 16:9e:18:c0:45:c0:7e:a5:7c:84:40:52:c4:ca:00:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 98:18:94:1e:05:de:33:15:aa:a0:d5:b9:ae:bb:27:a5: 87:c8:3a:a4:ba:70:ab:07:de:19:7b:e7:c9:63:9c:c7: 4a:80:52:2e:7e:1f:fc:d8:30:80:4e:8b:e8:9b:b2:d8: 38:b0:87:ff:e3:23:cc:87:cc:e6:a6:dc:80:4c:c2:dc: 6d:0b:b7:7c:e9:4a:17:bc:d7:d5:45:66:09:62:4f:f8: e6:49:cb:15:b7:ea:50:c5:f6:8b:e2:68:e4:38:c7:28: 55:87:5f:cb:38:bf:94:69:2c:71:8a:bf:52:31:fb:eb: 3a:34:b5:92:eb:db:c3:c6:56:63:4b:ed:2f:69:46:25 Fingerprint (MD5): 02:2A:4F:96:35:50:A7:A6:86:5B:5E:A4:9C:38:A5:B1 Fingerprint (SHA1): AE:CE:B2:44:8E:B6:12:8D:B5:47:D4:16:98:85:B1:E3:C3:F0:68:0E Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2022: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2023: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:15:33 2011 Not After : Tue Nov 08 16:15:33 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:19:ba:ae:90:83:82:34:3a:86:ad:01:9f:04:07:2f: c8:ae:a4:82:f8:fb:81:7f:e6:10:cd:24:7d:61:4c:2f: 90:7f:ba:24:24:73:1e:3d:e8:39:2c:a5:85:19:b2:28: 68:6a:d7:9b:e0:e2:ac:c5:37:a9:40:30:a4:56:36:08: b6:81:eb:90:50:ff:c4:01:91:c1:75:3f:42:1a:d6:f3: 10:29:46:ee:6e:5d:2c:11:8e:2a:e4:cb:bf:00:d3:e6: 79:e9:8a:af:c5:d8:12:d3:8b:f0:d1:04:7b:66:67:b5: 16:9e:18:c0:45:c0:7e:a5:7c:84:40:52:c4:ca:00:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 98:18:94:1e:05:de:33:15:aa:a0:d5:b9:ae:bb:27:a5: 87:c8:3a:a4:ba:70:ab:07:de:19:7b:e7:c9:63:9c:c7: 4a:80:52:2e:7e:1f:fc:d8:30:80:4e:8b:e8:9b:b2:d8: 38:b0:87:ff:e3:23:cc:87:cc:e6:a6:dc:80:4c:c2:dc: 6d:0b:b7:7c:e9:4a:17:bc:d7:d5:45:66:09:62:4f:f8: e6:49:cb:15:b7:ea:50:c5:f6:8b:e2:68:e4:38:c7:28: 55:87:5f:cb:38:bf:94:69:2c:71:8a:bf:52:31:fb:eb: 3a:34:b5:92:eb:db:c3:c6:56:63:4b:ed:2f:69:46:25 Fingerprint (MD5): 02:2A:4F:96:35:50:A7:A6:86:5B:5E:A4:9C:38:A5:B1 Fingerprint (SHA1): AE:CE:B2:44:8E:B6:12:8D:B5:47:D4:16:98:85:B1:E3:C3:F0:68:0E Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2024: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2025: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED ./chains.sh: line 806: ping: command not found OCSP server not accessible, skipping OCSP tests chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2026: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -m 1108161577 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2027: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2028: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #2029: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2030: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1108161578 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2031: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #2032: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2033: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 /localhost-18966-CA0-1108161467.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2034: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108161454.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2035: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #2036: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #2037: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-CA0-1108161467.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2038: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1108161579 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2039: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #2040: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2041: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 /localhost-18966-CA0-1108161467.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2042: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108161455.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2043: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #2044: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2045: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2046: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1108161580 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2047: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #2048: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2049: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-CA0-1108161467.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2050: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108161456.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2051: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der chains.sh: #2052: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2053: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-CA0-1108161467.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2054: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108161457.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2055: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der chains.sh: #2056: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20111108161540Z nextupdate=20121108161540Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Nov 08 16:15:40 2011 Next Update: Thu Nov 08 16:15:40 2012 CRL Extensions: chains.sh: #2057: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161540Z nextupdate=20121108161540Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:15:40 2011 Next Update: Thu Nov 08 16:15:40 2012 CRL Extensions: chains.sh: #2058: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20111108161540Z nextupdate=20121108161540Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Nov 08 16:15:40 2011 Next Update: Thu Nov 08 16:15:40 2012 CRL Extensions: chains.sh: #2059: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20111108161540Z nextupdate=20121108161540Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Nov 08 16:15:40 2011 Next Update: Thu Nov 08 16:15:40 2012 CRL Extensions: chains.sh: #2060: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161541Z addcert 20 20111108161541Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:15:41 2011 Next Update: Thu Nov 08 16:15:40 2012 Entry (1): Serial Number: 20 (0x14) Revocation Date: Tue Nov 08 16:15:41 2011 CRL Extensions: chains.sh: #2061: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161542Z addcert 40 20111108161542Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:15:42 2011 Next Update: Thu Nov 08 16:15:40 2012 Entry (1): Serial Number: 20 (0x14) Revocation Date: Tue Nov 08 16:15:41 2011 Entry (2): Serial Number: 40 (0x28) Revocation Date: Tue Nov 08 16:15:42 2011 CRL Extensions: chains.sh: #2062: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2063: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2064: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2065: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined TIMESTAMP chains END: Tue Nov 8 16:15:42 UTC 2011 chains.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Tue Nov 8 16:15:43 UTC 2011 TIMESTAMP libpkix END: Tue Nov 8 16:15:43 UTC 2011 Running tests for cert TIMESTAMP cert BEGIN: Tue Nov 8 16:15:43 UTC 2011 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #2066: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2067: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2068: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2069: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #2070: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #2071: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2072: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2073: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #2074: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2075: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #2076: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2077: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #2078: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #2079: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2080: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2081: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #2082: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2083: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #2084: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2085: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #2086: Exporting Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #2087: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2088: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2089: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #2090: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #2091: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #2092: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert cert.sh: #2093: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #2094: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert cert.sh: #2095: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #2096: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2097: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2098: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #2099: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert cert.sh: #2100: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #2101: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert cert.sh: #2102: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #2103: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert cert.sh: #2104: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #2105: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2106: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #2107: Import Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2108: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #2109: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert cert.sh: #2110: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #2111: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2112: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #2113: Import Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2114: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #2115: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #2116: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2117: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #2118: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert cert.sh: #2119: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #2120: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #2121: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2122: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #2123: Import Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2124: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #2125: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert cert.sh: #2126: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #2127: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2128: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #2129: Import Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2130: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #2131: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert cert.sh: #2132: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #2133: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2134: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #2135: Import Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2136: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #2137: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert cert.sh: #2138: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #2139: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2140: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #2141: Import Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2142: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #2143: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert cert.sh: #2144: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #2145: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #2146: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #2147: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #2148: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #2149: Import Eve's cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #2150: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2151: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #2152: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... cert.sh: #2153: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #2154: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2155: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #2156: Import Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2157: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #2158: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert cert.sh: #2159: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:82 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:49 2011 Not After : Wed Feb 08 16:15:49 2012 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:41:c2:c6:fb:ca:88:d4:e7:cd:a5:f4:cd:82:96:60: 3c:bb:ba:0c:0d:c5:d9:99:45:9a:a3:48:24:bf:51:f9: 44:22:fe:b6:80:75:29:f4:4f:87:5f:ac:6e:cf:0e:1a: b9:ce:08:17:20:66:35:86:7f:cd:fc:a9:80:e6:ea:e8: cd:30:18:94:a5:da:9d:a8:ae:2e:1d:f7:1d:0c:c2:57: 42:7b:3d:49:ab:20:62:a5:5d:99:be:39:76:d3:7c:9b: 53:36:3a:df:00:a4:db:89:38:1b:48:0d:30:95:db:f5: db:b8:c6:fa:cc:5e:34:93:54:c2:5c:d2:5e:fb:e7:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3a:39:32:cc:ee:da:b7:b9:01:85:4c:d1:bd:6e:e3:74: 71:9e:45:48:85:f3:2d:09:fd:1c:c6:5c:fe:e5:5e:67: 84:36:e6:cf:7f:dd:0b:a4:42:5a:e4:f8:d4:3f:3f:64: 19:4f:a7:96:5f:2d:ed:31:b1:71:a8:be:d9:3b:77:2f: 2d:12:3b:ac:4c:70:8f:fa:3b:33:fb:b1:cf:56:00:7f: 06:73:9f:ac:1c:2b:5c:1a:01:97:a0:af:20:eb:5e:d1: d9:4a:79:31:63:80:68:e9:34:24:50:53:4f:bb:9c:0f: 53:98:fd:5c:64:ba:df:13:42:b8:24:fd:23:b9:02:ac Fingerprint (MD5): DD:B8:CF:EF:DC:48:7A:D5:41:A3:3E:28:55:5D:7A:34 Fingerprint (SHA1): 84:B6:5A:A5:E3:CD:54:B9:D1:B5:78:76:72:3C:F0:68:C6:D5:CC:2D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2160: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:82 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:50 2011 Not After : Wed Feb 08 16:15:50 2012 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:0b:c2:b0:e0:dc:64:1d:ff:59:2f:91:6c:ec:41:c6: 23:28:17:7a:3f:ec:52:a4:bb:24:a4:a4:ff:58:42:b5: 64:c4:31:c3:5f:c9:84:3a:e0:79:c1:00:1c:88:0b:ab: 34:ed:da:ce:b6:1b:08:cf:5d:cf:60:c4:fc:98:7e:8f: c6:03:c2:e8:f8:13:7f:63:27:cb:e4:9f:f6:4c:3f:1d: 14:c1:5e:64:10:d4:61:2f:58:4f:52:f0:19:f5:a3:21: 71:7f:6c:80:42:af:cb:d9:72:c9:ed:78:ad:fe:80:fd: d1:79:be:88:ce:21:0b:46:92:fd:c7:a9:6f:1f:1e:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 80:8e:4c:50:c8:1c:de:73:32:5c:73:07:b9:f8:e9:00: 05:91:d8:eb:73:6c:1c:7a:64:46:88:e9:e5:9d:1e:18: e2:c3:0a:85:3a:c3:d4:50:83:e5:aa:1e:cb:a7:65:ac: 94:59:0e:47:75:2f:d3:fb:92:54:a6:2c:3d:7e:bd:7f: ca:77:49:a1:e8:50:1e:50:b7:34:97:e1:4b:45:33:0c: 1e:25:0f:56:b3:6a:48:fc:22:84:29:63:4f:28:ce:14: bd:cd:4b:57:d3:90:c3:47:da:f1:20:ae:97:36:1d:f7: 7e:17:b4:c2:4c:3f:d5:d3:c9:e5:de:4c:06:15:e8:ec Fingerprint (MD5): 5D:7B:C6:B3:BA:8E:A9:FC:6F:F6:80:B3:45:37:EF:31 Fingerprint (SHA1): CD:3C:A2:B5:7F:3F:63:42:81:ED:CF:CE:CF:09:EB:BA:14:84:99:09 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2161: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:83 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:50 2011 Not After : Wed Feb 08 16:15:50 2012 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:01:d8:0b:0f:b0:d8:53:76:0d:24:03:a7:9e:c3:de: aa:0e:a8:21:d8:0e:73:39:b2:52:3e:d8:5e:45:c2:81: cc:c4:d7:4c:67:cd:36:95:81:a2:c7:49:89:9e:2f:b2: 49:99:e0:b2:25:ce:d5:88:a2:0b:a5:1f:f6:54:8b:72: 7a:b5:c4:c6:3c:77:0b:4d:a6:c2:05:e6:0d:3d:6a:46: 2b:8f:14:d3:d8:b6:36:a5:bd:c6:41:79:82:dd:59:36: 91:2d:39:e5:10:e3:7e:85:54:72:13:65:d9:72:a4:8b: 4a:a4:05:54:44:3d:52:f2:23:72:88:f6:db:14:33:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6c:f2:51:57:cc:b5:99:e2:dd:fb:38:5c:0e:74:1f:50: 7a:16:64:db:a1:18:c7:78:d4:6c:f4:43:1b:fa:f2:9c: 25:7f:a3:91:2c:8e:b6:f9:cd:a8:50:ae:3d:29:14:57: ce:00:94:24:87:37:fd:22:b7:b3:36:ff:55:2b:a2:8d: 4d:ed:fc:90:bf:30:62:2e:60:7e:16:f4:01:40:81:f8: a8:90:c7:a3:9d:a9:2f:81:6e:b5:f6:83:f2:3c:80:46: 0a:e2:79:d0:4a:e2:98:3f:9f:d4:35:ce:fa:fb:b7:3a: aa:92:e7:b7:8b:d6:4d:87:91:4f:58:53:6e:a1:7b:68 Fingerprint (MD5): 29:52:3B:28:DB:5C:53:5F:83:87:6B:2E:8D:AD:96:71 Fingerprint (SHA1): AF:D4:04:60:E1:B9:47:BD:72:1B:4C:BA:C6:74:0A:CA:51:EA:40:92 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2162: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:83 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:50 2011 Not After : Wed Feb 08 16:15:50 2012 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:91:0b:75:b2:59:5e:85:66:96:ce:8b:9a:99:83:b4: c4:95:c3:ba:a6:f4:a2:04:87:23:3b:2f:eb:cb:ff:03: fb:10:2c:8d:88:a6:33:04:b8:3c:11:cd:3b:d0:9c:1d: 82:12:a5:35:3d:71:1d:19:ee:2f:ad:a5:57:85:45:cc: 73:88:de:aa:f3:c0:fb:90:eb:54:2c:05:fa:4f:df:41: 5b:7d:d1:47:0f:e6:7d:6f:a9:a1:17:6d:a6:31:9e:ec: 37:61:78:5a:48:df:b6:d6:20:f0:98:57:22:da:39:ae: 00:27:73:b8:70:3c:df:88:71:1f:1c:50:55:83:c4:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 46:4a:8e:35:18:5d:a0:dd:35:12:c5:f5:13:ff:04:f5: 8b:90:5a:c4:23:85:64:68:3d:60:9a:1a:aa:8b:4c:27: 14:11:e2:f2:63:47:31:93:35:da:d0:3e:63:3c:09:4e: f9:3c:c8:d6:4f:a7:24:75:e3:41:da:46:92:37:2a:80: ab:be:7a:2e:d3:a0:e6:48:82:fd:75:47:c6:04:ad:22: f4:b8:5c:d8:5f:f9:8e:89:93:dc:c6:b7:71:c1:9e:13: 18:7f:fa:06:39:2a:76:79:8e:20:38:24:34:a8:06:29: d1:84:53:00:bd:03:87:4e:4d:d7:7f:82:4b:bd:46:e8 Fingerprint (MD5): B3:85:79:35:D0:A6:87:D5:CB:DC:BC:FF:BF:71:3C:B9 Fingerprint (SHA1): 30:4A:E7:94:C9:9A:89:11:09:A7:A5:5E:8C:7D:E3:35:61:EF:AA:7E Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2163: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:83 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:50 2011 Not After : Wed Feb 08 16:15:50 2012 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:f9:9a:5f:55:5e:01:83:90:ef:81:ed:c3:35:07:0b: e8:2d:01:1b:02:9b:10:bd:c6:63:c5:5b:67:c2:32:f8: ee:9d:80:0c:72:9b:c5:f6:7b:19:eb:a7:b6:2a:dc:ee: 50:e6:3f:46:88:bb:31:8c:ef:78:6a:44:2d:3b:62:16: b5:2c:94:2b:64:95:7c:87:1d:56:df:4f:db:bc:e7:59: 83:11:11:83:30:41:97:01:a1:d9:24:4d:77:d9:59:25: 33:b9:d7:f4:08:c3:7a:f2:a6:88:5f:76:2c:08:7f:fa: 36:99:fa:a6:24:8e:c1:d1:46:17:2f:8a:60:c4:5d:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 24:39:c5:6e:d9:6d:fa:d5:2f:c6:14:cd:f3:d1:da:8b: 2c:e0:5c:6b:9c:da:78:e1:f5:dd:36:93:22:c5:7e:e5: 89:c0:5e:28:38:d3:0d:2b:f7:f7:c5:85:11:3a:0c:b9: 0c:f9:62:ca:24:ee:d4:dc:6f:b7:99:ec:67:9c:fa:60: 25:06:d9:99:d3:64:b0:ef:78:05:57:14:4d:08:96:44: d8:76:2d:c6:ef:e8:63:e8:1b:f5:f4:39:7a:1c:fd:7e: d9:58:5b:63:1b:77:90:5e:07:8f:6f:c9:d7:61:6f:85: bd:7f:0c:40:76:bd:2f:87:db:22:56:99:9e:87:19:fa Fingerprint (MD5): 44:24:9B:C4:8D:5E:59:A5:A4:DD:6D:94:E1:5D:74:01 Fingerprint (SHA1): EB:99:8F:B1:BD:44:0A:A8:0F:C0:04:F3:8A:46:D8:6C:7C:13:7E:2D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2164: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:84 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:51 2011 Not After : Wed Feb 08 16:15:51 2012 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:4b:fc:c7:95:eb:e0:b8:12:d7:c7:72:6b:92:46:17: b0:c1:1a:5f:1e:9f:d3:6c:32:67:47:22:54:9e:70:ae: 5f:88:63:57:c6:8e:05:b2:f7:bb:26:ec:af:ca:3a:cd: ac:36:bf:53:dd:c2:27:31:30:56:25:df:f2:4c:f2:bf: 82:63:0a:47:fa:d7:79:42:64:e8:bd:00:dc:fe:0b:49: 98:7a:73:6f:23:bc:ba:29:4f:e0:da:5c:4c:2f:02:46: d6:d1:8b:89:cb:f8:8a:92:ef:98:da:f6:02:53:56:7f: 9a:f0:fe:11:06:67:83:80:f3:50:96:14:dd:d1:30:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ba:92:e6:6f:97:bb:45:b0:b1:27:16:ef:01:8a:9b:52: 3d:1a:64:33:c3:9f:30:69:c2:bc:ea:01:38:f0:48:20: 16:26:18:94:8e:57:1f:6d:73:06:21:5c:58:84:fd:b0: 9d:6b:4f:38:2c:34:e4:5d:7b:23:59:da:ac:e8:10:9a: 90:f7:3a:4d:73:bb:8e:7a:d2:84:9e:a3:2f:5d:bc:34: 81:c6:05:3b:cd:ec:3d:15:d2:0d:ef:e8:35:95:c8:08: 02:53:da:1f:dd:15:9c:ec:e5:07:1f:8d:df:5e:80:e8: 0a:9a:2b:5b:32:50:1d:18:1d:30:0b:8b:08:31:2a:e3 Fingerprint (MD5): F1:1E:BF:0A:FA:F3:4B:5C:54:A1:1D:F8:0E:ED:E0:38 Fingerprint (SHA1): F4:DB:19:62:61:DF:49:C6:D6:69:5B:B7:08:0B:95:DF:07:0A:71:9A Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2165: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:85 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:51 2011 Not After : Wed Feb 08 16:15:51 2012 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:4b:29:a5:6f:29:94:92:60:b2:dc:2d:7b:7b:3c:15: bd:0e:48:64:6b:53:ed:82:69:e9:d2:bb:bb:50:9c:c2: 29:16:d7:4a:20:1d:6f:d4:23:b3:0e:12:05:22:43:7e: 77:bb:ab:0a:38:61:d4:77:b9:97:2f:fc:26:68:4d:70: 48:f8:13:0d:37:22:ad:d0:27:35:e4:c5:d1:d2:61:7a: 1a:20:fd:00:38:f8:03:91:4c:49:49:a0:1e:67:a0:1f: 69:e5:38:de:53:7c:d4:7c:99:e4:df:65:f3:2a:b6:a3: a2:3a:a6:51:25:2f:55:a2:c3:e4:eb:ed:cb:44:0a:01 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 03:bc:ab:46:3c:5e:78:aa:f5:bd:30:56:03:33:1a:ea: 07:3a:06:4c:2f:fd:8c:aa:7d:85:72:be:f2:6a:7d:4a: 2f:ca:f7:b9:60:c0:ba:a6:28:38:76:e9:cd:6f:1d:f0: 32:7a:b1:70:14:72:40:e7:77:93:90:48:71:7b:7d:ae: 8e:ff:1c:ce:b6:0b:b3:54:34:97:25:a5:cb:bf:07:a5: 1e:74:b9:cb:16:94:0f:06:ad:69:ea:12:01:f2:bd:9a: 52:29:c1:a3:e6:5f:3c:c9:52:d6:a3:79:dc:3c:9e:ba: 2a:77:8f:14:1f:ae:a9:c8:bd:38:56:1d:f6:4b:fe:fc Fingerprint (MD5): DC:C0:B0:84:ED:D3:24:86:8B:CC:94:6A:F2:06:19:52 Fingerprint (SHA1): AC:75:65:76:90:F3:F7:7C:15:1E:66:F2:96:BC:8D:BA:5A:8A:EF:E1 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2166: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:86 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:51 2011 Not After : Wed Feb 08 16:15:51 2012 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:ae:1e:e0:8b:04:62:41:59:1b:a1:18:51:c2:e7:c6: 6b:9d:91:f2:91:5f:5c:31:aa:4e:09:ef:f3:44:54:d8: ab:2a:fe:3f:b4:b8:e4:6e:64:89:df:2f:40:df:12:7f: 84:23:d7:e7:b2:32:d4:52:ba:3e:28:3d:3c:c3:b6:50: 27:3b:5d:a3:60:06:67:40:e8:57:a3:5b:bd:48:91:11: 53:bd:65:fa:dc:2c:04:7e:17:38:5b:46:31:da:e4:dc: e0:a7:43:f4:38:f0:1e:0b:a6:15:ba:6e:bf:4b:90:3c: 2e:48:6c:65:17:6b:b5:71:da:a2:35:ef:d4:f4:53:bd Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 74:cc:fd:f8:2a:e3:b9:80:17:6f:21:78:b1:a0:a1:47: 5a:2e:e3:ca:b8:17:55:48:1f:63:46:93:3e:ce:82:20: ef:97:31:5b:4a:d1:87:7d:24:8b:7a:4f:eb:12:eb:5c: 78:29:9c:10:61:d4:4a:8c:ed:f8:41:f7:db:13:08:63: 67:9e:cb:c9:35:66:26:f2:25:78:94:aa:f7:9f:e2:99: fa:27:34:be:23:42:f5:fa:92:11:9e:5f:e9:d1:00:b4: db:7c:ea:56:1f:1a:ab:7f:d2:ec:6f:31:cb:0f:57:29: f4:d6:dd:c1:6f:53:8a:6c:bc:f3:1c:51:9c:35:ec:41 Fingerprint (MD5): F2:9E:09:3C:68:11:E7:B5:20:C1:39:5B:AB:45:53:DD Fingerprint (SHA1): BF:51:D1:12:F9:7B:E7:E6:C8:F8:50:07:3D:C7:1B:3D:FB:5E:E0:E2 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2167: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:86 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:52 2011 Not After : Wed Feb 08 16:15:52 2012 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:f0:e8:43:75:23:df:11:6f:7b:c3:82:5f:f0:d7:b0: 8b:08:ef:d3:b8:76:f3:54:08:99:fa:76:1e:fd:a5:b5: 15:ae:9e:a0:9b:1e:e3:df:a0:1c:31:8a:aa:fa:e4:96: 5b:01:4c:d8:32:4c:9c:43:67:5b:26:cb:17:08:19:bd: 37:53:e2:b9:c7:bd:f7:bf:af:df:d3:ad:eb:4e:52:ec: 02:d6:97:14:58:6d:3d:ce:bb:88:36:64:5f:ed:73:d8: 08:bc:32:40:da:91:77:e9:41:97:11:2d:3c:99:11:d2: a2:e3:b0:b5:8b:a9:f8:c5:5e:2e:be:93:3d:52:1e:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b0:a3:c0:b8:3f:3e:27:15:56:d7:06:d5:d6:e8:93:cf: cc:0a:f9:a5:9f:1d:17:3d:c3:75:d4:6e:23:d8:44:e6: 8d:4f:14:6c:c8:4f:de:73:94:a9:1c:f2:5a:4a:a0:eb: 50:ca:35:19:6f:14:72:ac:67:45:53:78:a3:5f:e0:f3: d1:08:b8:39:29:d0:3b:44:03:23:13:21:bc:ec:e5:8f: e3:f4:66:d9:15:9d:ac:5a:99:77:22:50:29:b5:b0:83: fa:ec:d8:f5:e5:b0:9e:f9:f4:5a:4d:1c:81:6c:51:a8: 41:21:4d:21:b1:92:b9:97:67:83:9d:4e:e3:3a:4f:9b Fingerprint (MD5): E1:46:43:E2:DB:8C:2A:E2:E1:F5:2C:04:BB:D1:28:C6 Fingerprint (SHA1): 1A:E7:E6:0D:C7:76:DA:73:20:70:FF:E6:FF:DD:D4:07:98:3F:9A:7D Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2168: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:87 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:52 2011 Not After : Wed Feb 08 16:15:52 2012 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:ac:ee:fe:0e:4d:50:d9:ee:1d:a1:be:2a:97:3a:43: 7b:61:6d:50:0a:19:0b:a3:55:68:84:45:46:53:13:d2: 04:8f:85:de:2c:5f:7c:e4:5a:11:21:19:d1:59:84:42: 62:60:37:3a:28:aa:80:bd:f1:55:ef:89:2b:ee:41:2b: 3a:2a:97:fe:ef:c0:c1:91:ad:2a:0b:68:1e:b5:8e:8e: a9:1e:a0:13:1c:eb:fb:db:b0:b8:33:90:10:ff:a3:9d: d1:54:1f:7d:6d:05:12:6f:20:a3:2e:88:e7:6d:5a:9a: b0:de:fe:7a:2c:3f:63:d1:ab:50:d0:5a:4c:87:4f:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1f:07:ef:ce:49:7d:45:e1:5a:22:fe:af:52:ad:66:cf: 47:31:e1:3c:e8:90:b5:ad:19:48:f0:28:f7:50:74:8a: 6a:5a:77:85:ae:4d:06:d1:ca:b5:44:0d:75:9c:e9:93: 94:fd:6c:bb:a1:a9:f7:c8:aa:6f:1c:5b:48:04:e6:15: 9e:48:3e:96:5f:7c:96:a8:6c:72:7d:54:09:fd:20:a6: 15:8d:0a:0e:b6:54:f6:fd:c6:59:bf:bc:2e:32:3b:20: f9:0a:4d:a6:00:d8:df:21:26:b4:b8:9a:3e:10:46:4a: ad:ce:39:13:3f:b9:6c:8a:2c:bf:d4:56:96:dd:42:b9 Fingerprint (MD5): C7:AA:19:F1:AC:23:91:0A:8A:99:E1:C0:82:D3:E1:B9 Fingerprint (SHA1): 85:EB:EA:B0:01:3E:60:5F:CA:C9:FA:B0:61:6D:B0:5E:87:99:E0:AF Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2169: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:6f:87 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:15:52 2011 Not After : Wed Feb 08 16:15:52 2012 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:ed:4e:7d:24:53:51:19:5f:14:1e:c8:68:91:e1:f9: b7:30:e1:ff:87:f6:01:24:e2:e9:ab:01:94:e6:5f:b0: 40:6a:2c:2c:89:6f:c8:0c:cf:31:ce:11:58:eb:b9:4f: d1:9f:b0:e3:8d:73:db:d8:42:d3:88:7d:6a:7b:00:36: 6c:a6:49:2c:ba:ee:a7:41:31:a1:49:67:4a:82:42:18: 3f:b8:05:f3:19:69:97:df:14:2c:eb:54:82:88:85:d8: cd:f2:de:44:80:56:11:04:e7:5f:5b:b9:01:7a:fd:d8: 55:b5:a3:47:f3:b8:36:03:6b:a2:7b:dd:ab:7d:71:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2b:2a:1c:d4:51:18:48:62:58:2b:2e:ec:d7:86:86:92: 29:e6:82:e3:fd:85:86:a0:95:69:ba:c0:5b:7e:4c:d1: 0e:5a:30:52:df:06:3b:05:6a:0b:4e:7d:40:b7:36:cd: 4e:e7:3a:b8:59:10:93:ea:3d:b9:c8:dc:a7:5e:51:37: 86:5d:a6:0e:e6:93:5e:75:3e:d7:bd:ec:f6:b0:7d:14: 4e:c1:01:32:a5:06:78:c3:33:2b:b8:2f:c7:a1:a4:5c: 7b:97:a3:19:80:c5:90:ea:af:b8:86:35:35:1f:03:8a: 77:86:47:d6:53:d6:81:9c:79:e1:e3:de:c4:35:6a:ff Fingerprint (MD5): 23:54:42:68:21:66:B0:FF:21:A3:63:64:15:53:DC:8E Fingerprint (SHA1): D1:23:88:CB:08:A9:08:10:19:F9:DD:86:E6:33:13:B1:6E:FA:4A:6F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #2170: Certificate Key Usage Extension (11) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #2171: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2172: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2173: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #2174: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #2175: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... cert.sh: #2176: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #2177: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #2178: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #2179: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #2180: Import Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2181: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #2182: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert cert.sh: #2183: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #2184: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #2185: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #2186: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #2187: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2188: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: `./req' and `/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #2189: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert cert.sh: #2190: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2191: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2192: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2193: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2194: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #2195: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #2196: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2197: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2198: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2199: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2200: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #2201: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #2202: Verify Distrusted Cert for Object Signer - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2203: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #2204: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert cert.sh: #2205: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2206: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #2207: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert cert.sh: #2208: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2209: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #2210: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert cert.sh: #2211: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2212: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #2213: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert cert.sh: #2214: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2215: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #2216: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert cert.sh: #2217: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2218: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #2219: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert cert.sh: #2220: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2221: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #2222: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert cert.sh: #2223: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2224: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #2225: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert cert.sh: #2226: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2227: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #2228: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert cert.sh: #2229: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2230: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #2231: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert cert.sh: #2232: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2233: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #2234: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert cert.sh: #2235: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2236: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #2237: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert cert.sh: #2238: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #2239: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #2240: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert cert.sh: #2241: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #2242: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #2243: Modify CRL by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #2244: Modify CRL by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #2245: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #2246: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. cert.sh: #2247: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #2248: Importing CRL for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Tue Nov 8 16:16:05 UTC 2011 Running tests for tools TIMESTAMP tools BEGIN: Tue Nov 8 16:16:05 UTC 2011 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2249: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 99:12:48:74:d5:ec:28:8b:11:ae:26:65:53:5f:fb:c8 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2250: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2251: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2252: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 92:3a:06:1b:d6:19:26:e9:04:39:78:8e:1b:89:27:75 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2253: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2254: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2255: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 76:56:8b:a4:20:34:9d:03:e7:03:45:14:99:ca:ca:b1 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2256: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2257: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2258: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 83:e0:d8:ce:5e:68:82:a5:b0:e9:5b:1e:a6:11:6e:dc Iteration Count: 1 (0x1) tools.sh: #2259: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2260: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2261: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:f0:28:25:aa:3d:81:76:12:fa:e4:07:ed:ba:03:83 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2262: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2263: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2264: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d1:3f:af:1a:fa:4d:0b:4a:90:b7:f3:ac:42:27:8d:23 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2265: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2266: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2267: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ba:61:3d:73:17:e9:3d:8f:f7:1a:8b:89:dc:2f:49:f9 Iteration Count: 1 (0x1) tools.sh: #2268: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2269: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2270: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:91:4f:10:9c:ff:6e:5e:aa:b9:23:0d:44:13:4c:29 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:1a:c9:46:b9:20:5c:3b:63:9a:ac:88:60:ea:0e: 12:1d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2271: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2272: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2273: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 17:2b:3d:ca:b2:57:73:87:52:31:a7:4d:87:fd:a8:df Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:ba:4b:ae:58:a9:34:4c:ea:32:c2:bf:60:2f:82: ab:4c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2274: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2275: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2276: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 64:20:55:e0:f4:8d:9a:fa:f3:47:93:71:53:c6:de:16 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:7c:49:66:50:42:b3:d2:ce:be:d1:fc:aa:2a:ec: 07:08 tools.sh: #2277: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2278: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2279: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:0a:ee:d1:2b:05:d5:40:20:af:f2:8c:33:3d:79:0a Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:0c:28:99:59:9f:0f:21:97:ef:84:89:50:cf:2e: 26:e6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2280: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2281: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2282: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 15:6b:70:a2:6a:1e:92:e0:e4:13:b4:50:1b:b5:12:b5 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:f2:fe:0c:92:be:fa:e9:24:24:29:30:3c:e5:8e: d3:ba Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2283: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2284: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2285: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:43:90:e7:e4:d7:29:1a:b8:7f:97:d7:67:37:2f:b9 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:aa:28:15:2e:60:c6:bd:13:80:9a:cb:d9:08:3d: e0:9e tools.sh: #2286: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2287: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2288: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dc:e0:08:9e:0d:9f:03:7f:70:1f:f2:d4:c5:bb:92:33 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a1:09:36:ad:8e:72:95:94:e0:99:3a:9d:64:db: 89:74 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2289: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2290: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2291: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d2:00:c0:76:ec:23:ca:7c:7f:75:80:bb:f5:ce:98:65 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:bc:c5:70:b4:fc:06:2a:7b:c6:d6:22:78:a7:33: ce:f6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2292: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2293: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2294: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:55:07:dd:95:ad:a2:64:08:4e:af:1c:df:17:fa:72 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:64:21:c0:d3:3a:7c:7e:18:2f:08:d4:10:f8:f5: 14:7c tools.sh: #2295: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2296: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2297: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ad:f9:24:82:d0:ca:00:37:15:7e:0e:fc:d4:b8:ad:18 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:4b:95:13:f2:06:6f:61:f5:db:64:2d:31:11:bb: 91:86 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2298: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2299: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2300: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5e:5a:43:54:10:67:33:27:ff:25:d4:88:80:d0:71:32 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:d7:c0:99:90:1f:9a:ff:3c:66:d8:7c:27:1f:e9: 3d:d4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2301: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2302: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2303: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:99:2e:5a:9f:47:5b:c0:32:18:3d:07:7d:0b:69:19 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:4b:14:64:ff:27:eb:5c:8e:53:50:84:b9:22:22: c8:3a tools.sh: #2304: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2305: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2306: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bc:a4:36:0a:81:d7:c1:aa:bd:15:e3:2f:11:ca:b5:97 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:9a:56:be:6e:be:fa:1a:4d:52:48:3e:f9:12:e8: ed:70 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2307: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2308: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2309: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: de:ad:29:0b:88:3d:39:48:49:5a:98:b1:32:3b:d1:d1 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:6e:86:a9:54:7f:89:f2:e2:74:b5:8f:b8:74:e2: 18:c9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2310: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2311: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2312: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 60:3f:9a:e8:8c:ce:3e:e9:b3:a5:b0:e8:89:71:ff:d1 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:8f:20:36:f6:56:77:ac:b5:29:8e:c3:5b:7a:e9: 69:88 tools.sh: #2313: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2314: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2315: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 33:94:1f:7c:03:4a:64:80:fb:67:ad:07:50:cf:ae:bd Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:11:13:b3:68:7e:a7:80:9e:22:c5:b6:b9:dc:03: e5:a0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2316: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2317: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2318: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f9:17:47:fb:32:7a:d9:39:1d:64:1f:c1:72:c8:cd:c8 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:df:5e:0a:c8:5d:c8:f9:31:80:76:2f:aa:21:f9: 08:b7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2319: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2320: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2321: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8b:ad:98:3a:f9:bb:b0:aa:30:02:8f:81:e6:be:95:14 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:c9:e4:5d:57:a3:b2:2d:35:ec:75:23:d6:90:b5: 22:91 tools.sh: #2322: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2323: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2324: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: c5:76:b8:8f:19:16:2b:6d:37:a4:52:78:f0:19:37:2a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2325: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2326: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2327: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: f1:57:38:d7:1d:17:9f:05:04:49:46:50:d1:f6:00:50 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2328: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2329: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2330: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: f1:ab:d5:d7:f9:16:eb:a5:50:44:37:be:fa:62:e8:87 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2331: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2332: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2333: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: c1:dc:6b:c0:77:23:4a:6b:49:75:db:92:6f:91:a4:d3 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2334: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2335: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2336: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 58:c0:ed:d5:71:19:58:bc:63:af:d7:4f:d5:14:c9:ec Iteration Count: 1 (0x1) tools.sh: #2337: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2338: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2339: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 10:1f:25:44:45:19:82:d7:39:00:9a:69:81:31:91:97 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2340: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2341: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2342: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 2a:58:7c:e4:c3:12:21:37:ce:f1:da:c2:54:85:c8:7e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2343: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2344: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2345: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: d0:96:47:52:87:f2:30:4d:3c:e8:fc:16:52:e3:1d:34 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2346: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2347: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2348: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: f3:29:da:f6:be:b0:6b:3d:c9:8f:a9:23:2b:20:3b:fd Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2349: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2350: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2351: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 88:83:7e:1d:22:cd:e6:98:8e:26:89:c2:35:6d:e2:0f Iteration Count: 1 (0x1) tools.sh: #2352: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2353: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2354: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 14:85:05:1a:8f:00:55:91:11:e4:85:09:64:5e:f5:79 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2355: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2356: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 39:72:95:10:e4:3f:1e:9f:36:8b:97:ad:12:9d:60:8e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2358: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2359: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2360: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c0:6e:90:85:3a:71:ef:cb:24:30:8d:bb:41:a1:2c:37 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2361: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2362: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2363: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 58:6f:45:c9:f0:b1:a4:f7:6a:a9:d0:95:46:7a:f6:71 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2364: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2365: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2366: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 08:4f:c6:4a:d4:28:df:6d:7b:03:93:3f:ba:4c:ff:a8 Iteration Count: 1 (0x1) tools.sh: #2367: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2368: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2369: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 14:d3:50:0d:5d:4d:2c:43:9d:b0:3c:c3:c9:75:96:56 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2370: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2371: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2372: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2e:57:cc:b9:91:f6:64:6b:7e:2a:2a:18:8f:7d:87:4f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2373: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2374: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2375: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 97:55:7a:9a:7d:57:a9:e9:2b:14:42:3f:f7:e1:61:04 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2376: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2377: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2378: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:9b:41:f9:af:18:4e:71:d4:79:9d:d3:e5:b1:85:ce Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2379: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2380: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2381: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ba:d2:65:ea:1e:3f:c9:03:80:e4:00:08:a7:a2:58:c3 Iteration Count: 1 (0x1) tools.sh: #2382: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2383: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2384: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a6:7f:7c:0f:30:72:3c:2d:da:8b:0a:6e:dd:d0:fe:b4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2385: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2386: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2387: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ef:c4:3e:00:33:66:5d:1f:23:c4:1b:64:58:e7:bc:dc Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2388: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2389: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2390: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 00:7a:b8:19:52:ee:87:c9:60:5f:92:65:f4:46:3d:8e Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2391: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2392: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2393: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9e:82:4c:21:8f:f8:3c:e4:48:5d:2d:00:dc:63:ab:a5 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2394: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2395: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2396: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 47:eb:44:82:bd:5a:99:28:eb:6e:cb:35:b7:bb:d7:11 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2397: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2398: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2399: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ec:29:53:77:3c:7d:5d:75:ac:96:04:6c:79:e3:27:2c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2400: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2401: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2402: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:10:63:64:2e:19:e2:5a:59:64:53:d1:36:ef:92:b2 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2403: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2404: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2405: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:a2:3b:1c:33:60:86:c5:20:de:e9:e0:a0:60:01:a0 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2406: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2407: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2408: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:7c:e1:a4:c2:3e:c6:66:4d:fa:bc:92:0f:48:14:2a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2409: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2410: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2411: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ff:72:94:78:22:1a:3f:1b:8e:ee:9d:01:bc:2e:e6:db Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:43 2011 Not After : Tue Nov 08 16:15:43 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:44:a7:0a:ff:92:ea:9c:e1:ad:41:e6:c2:37:90:d2: 30:93:e1:6c:55:50:30:58:4c:29:4e:b6:7d:c5:eb:00: 4c:57:4c:06:9f:d8:05:c6:d0:59:74:ab:58:a9:3b:b9: 45:d0:18:77:d3:6d:7f:a2:1f:e4:24:6c:bd:9f:a0:d3: 25:b0:51:cd:00:aa:66:96:45:e1:2f:7c:17:1b:e7:f2: f3:53:bf:a0:fe:75:cd:f4:dc:47:77:40:fb:28:06:bb: 16:de:f9:5a:46:b2:cf:7d:5d:59:6b:10:7e:03:09:c2: 3c:f6:9f:cf:e8:bf:3d:40:5c:55:9f:73:a0:db:a3:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8f:3a:a7:30:91:dd:91:f0:6b:48:f7:ce:e2:9c:fe:fa: 79:97:9d:ab:95:0e:74:b2:3f:e7:67:bd:78:be:46:94: bd:c0:ae:a6:87:11:3b:7a:1e:e4:60:88:3c:c0:7e:22: cc:02:ea:4f:1b:db:a9:1d:4c:f5:c1:66:35:05:81:2f: 55:43:2f:57:a0:04:a7:6a:21:90:29:51:e2:9d:7b:a0: cf:9b:af:59:66:71:5c:9d:ab:2d:59:cb:7e:cd:d3:8e: 9e:97:24:ce:cc:93:85:f5:df:26:08:eb:9a:9c:56:b9: b7:75:e3:14:1b:04:64:16:84:d1:ae:96:06:cc:99:89 Fingerprint (MD5): E9:D2:8B:1D:35:12:DC:4B:7B:BF:2F:50:0D:31:A7:F7 Fingerprint (SHA1): 0B:0A:C7:6E:DD:A0:7E:10:6A:92:D9:17:77:46:76:38:8B:96:F7:A8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:15:47 2011 Not After : Tue Nov 08 16:15:47 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:7b:64:d3:98:59:75:2e:5f:27:70:96:8a:ee:4e:8d: f6:35:e3:f2:74:74:17:d0:e0:79:f8:ee:32:e1:14:b4: 36:ec:ae:19:68:81:b2:bd:ba:a3:a9:84:f5:19:9c:8a: a2:1a:e7:d8:77:6b:2f:4f:3d:e8:af:2a:e8:21:10:ec: b9:14:9f:99:93:95:a5:f2:90:11:1d:e4:cd:ba:45:e9: f5:81:75:2c:cb:0d:b0:ad:08:b4:d1:0c:e1:a3:68:46: 0c:c7:9a:c5:49:b2:4f:d4:35:2d:86:58:ea:db:3f:56: 4b:67:1b:40:71:e3:87:41:6c:e7:e7:67:aa:b4:7e:3f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 40:1e:6c:9d:ac:cf:aa:57:55:36:1b:75:bc:57:59:bf: e3:84:79:3d:fc:24:ca:0c:4d:76:95:bb:79:01:01:12: 7a:cd:ef:2e:46:3f:25:59:57:44:48:86:6b:ba:b8:30: cb:6c:97:c7:2e:86:66:0c:96:4e:be:c4:8e:c3:33:ac: b7:1c:c9:65:a7:f6:8e:47:5e:76:84:70:28:cb:02:7e: 7c:5c:dc:db:74:ec:b7:91:e8:98:05:5b:03:58:6e:24: d1:5b:59:62:0c:21:c8:86:c1:de:52:33:b7:7c:8b:a9: 32:96:c2:a4:55:d2:06:8a:35:80:7d:29:29:ef:11:7e Fingerprint (MD5): C6:AC:D9:16:06:44:E3:2C:6C:18:D2:4B:CB:DD:80:A3 Fingerprint (SHA1): 69:CD:BE:E3:68:56:CB:27:E6:DF:4F:3B:B1:1E:2E:71:8C:C1:60:E7 Friendly Name: Alice tools.sh: #2412: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #2413: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #2414: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #2415: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #2416: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #2417: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #2418: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #2419: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #2420: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #2421: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #2422: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Tue Nov 8 16:16:09 UTC 2011 Running tests for fips TIMESTAMP fips BEGIN: Tue Nov 8 16:16:09 UTC 2011 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #2423: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2424: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1b4fb325257936ada56aec64b455eb16d2eb3454 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #2425: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #2426: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #2427: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #2428: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #2429: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2430: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #2431: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #2432: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #2433: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #2434: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #2435: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1b4fb325257936ada56aec64b455eb16d2eb3454 FIPS_PUB_140_Test_Certificate fips.sh: #2436: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #2437: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #2438: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #2439: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #2440: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1b4fb325257936ada56aec64b455eb16d2eb3454 FIPS_PUB_140_Test_Certificate fips.sh: #2441: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #2442: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #2443: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000d7caf (883887): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #2444: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Tue Nov 8 16:16:26 UTC 2011 Running tests for ssl TIMESTAMP ssl BEGIN: Tue Nov 8 16:16:26 UTC 2011 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4916 >/dev/null 2>/dev/null selfserv_9519 with PID 4916 found at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 with PID 4916 started at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2445: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4916 at Tue Nov 8 16:16:27 UTC 2011 kill -USR1 4916 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4916 killed at Tue Nov 8 16:16:27 UTC 2011 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4972 >/dev/null 2>/dev/null selfserv_9519 with PID 4972 found at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 with PID 4972 started at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2446: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4972 at Tue Nov 8 16:16:27 UTC 2011 kill -USR1 4972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4972 killed at Tue Nov 8 16:16:27 UTC 2011 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5028 >/dev/null 2>/dev/null selfserv_9519 with PID 5028 found at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 with PID 5028 started at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2447: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5028 at Tue Nov 8 16:16:27 UTC 2011 kill -USR1 5028 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5028 killed at Tue Nov 8 16:16:27 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5096 >/dev/null 2>/dev/null selfserv_9519 with PID 5096 found at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 with PID 5096 started at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2448: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5096 at Tue Nov 8 16:16:27 UTC 2011 kill -USR1 5096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5096 killed at Tue Nov 8 16:16:27 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5152 >/dev/null 2>/dev/null selfserv_9519 with PID 5152 found at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 with PID 5152 started at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2449: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5152 at Tue Nov 8 16:16:27 UTC 2011 kill -USR1 5152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5152 killed at Tue Nov 8 16:16:27 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5208 >/dev/null 2>/dev/null selfserv_9519 with PID 5208 found at Tue Nov 8 16:16:27 UTC 2011 selfserv_9519 with PID 5208 started at Tue Nov 8 16:16:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2450: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5208 at Tue Nov 8 16:16:27 UTC 2011 kill -USR1 5208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5208 killed at Tue Nov 8 16:16:27 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5276 >/dev/null 2>/dev/null selfserv_9519 with PID 5276 found at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 with PID 5276 started at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2451: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5276 at Tue Nov 8 16:16:28 UTC 2011 kill -USR1 5276 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5276 killed at Tue Nov 8 16:16:28 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5332 >/dev/null 2>/dev/null selfserv_9519 with PID 5332 found at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 with PID 5332 started at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2452: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5332 at Tue Nov 8 16:16:28 UTC 2011 kill -USR1 5332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5332 killed at Tue Nov 8 16:16:28 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5388 >/dev/null 2>/dev/null selfserv_9519 with PID 5388 found at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 with PID 5388 started at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2453: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5388 at Tue Nov 8 16:16:28 UTC 2011 kill -USR1 5388 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5388 killed at Tue Nov 8 16:16:28 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5456 >/dev/null 2>/dev/null selfserv_9519 with PID 5456 found at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 with PID 5456 started at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2454: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5456 at Tue Nov 8 16:16:28 UTC 2011 kill -USR1 5456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5456 killed at Tue Nov 8 16:16:28 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5512 >/dev/null 2>/dev/null selfserv_9519 with PID 5512 found at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 with PID 5512 started at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2455: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5512 at Tue Nov 8 16:16:28 UTC 2011 kill -USR1 5512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5512 killed at Tue Nov 8 16:16:28 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5568 >/dev/null 2>/dev/null selfserv_9519 with PID 5568 found at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 with PID 5568 started at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2456: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5568 at Tue Nov 8 16:16:28 UTC 2011 kill -USR1 5568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5568 killed at Tue Nov 8 16:16:28 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5640 >/dev/null 2>/dev/null selfserv_9519 with PID 5640 found at Tue Nov 8 16:16:28 UTC 2011 selfserv_9519 with PID 5640 started at Tue Nov 8 16:16:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2457: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5640 at Tue Nov 8 16:16:29 UTC 2011 kill -USR1 5640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5640 killed at Tue Nov 8 16:16:29 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5696 >/dev/null 2>/dev/null selfserv_9519 with PID 5696 found at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 with PID 5696 started at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2458: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5696 at Tue Nov 8 16:16:29 UTC 2011 kill -USR1 5696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5696 killed at Tue Nov 8 16:16:29 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5752 >/dev/null 2>/dev/null selfserv_9519 with PID 5752 found at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 with PID 5752 started at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2459: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5752 at Tue Nov 8 16:16:29 UTC 2011 kill -USR1 5752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5752 killed at Tue Nov 8 16:16:29 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5820 >/dev/null 2>/dev/null selfserv_9519 with PID 5820 found at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 with PID 5820 started at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2460: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5820 at Tue Nov 8 16:16:29 UTC 2011 kill -USR1 5820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5820 killed at Tue Nov 8 16:16:29 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5876 >/dev/null 2>/dev/null selfserv_9519 with PID 5876 found at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 with PID 5876 started at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2461: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5876 at Tue Nov 8 16:16:29 UTC 2011 kill -USR1 5876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5876 killed at Tue Nov 8 16:16:29 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5932 >/dev/null 2>/dev/null selfserv_9519 with PID 5932 found at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 with PID 5932 started at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2462: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 5932 at Tue Nov 8 16:16:29 UTC 2011 kill -USR1 5932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5932 killed at Tue Nov 8 16:16:29 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6000 >/dev/null 2>/dev/null selfserv_9519 with PID 6000 found at Tue Nov 8 16:16:29 UTC 2011 selfserv_9519 with PID 6000 started at Tue Nov 8 16:16:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2463: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6000 at Tue Nov 8 16:16:30 UTC 2011 kill -USR1 6000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6000 killed at Tue Nov 8 16:16:30 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6056 >/dev/null 2>/dev/null selfserv_9519 with PID 6056 found at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 with PID 6056 started at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2464: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6056 at Tue Nov 8 16:16:30 UTC 2011 kill -USR1 6056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6056 killed at Tue Nov 8 16:16:30 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6112 >/dev/null 2>/dev/null selfserv_9519 with PID 6112 found at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 with PID 6112 started at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2465: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6112 at Tue Nov 8 16:16:30 UTC 2011 kill -USR1 6112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6112 killed at Tue Nov 8 16:16:30 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6180 >/dev/null 2>/dev/null selfserv_9519 with PID 6180 found at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 with PID 6180 started at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2466: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6180 at Tue Nov 8 16:16:30 UTC 2011 kill -USR1 6180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6180 killed at Tue Nov 8 16:16:30 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6236 >/dev/null 2>/dev/null selfserv_9519 with PID 6236 found at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 with PID 6236 started at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2467: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6236 at Tue Nov 8 16:16:30 UTC 2011 kill -USR1 6236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6236 killed at Tue Nov 8 16:16:30 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6292 >/dev/null 2>/dev/null selfserv_9519 with PID 6292 found at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 with PID 6292 started at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2468: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6292 at Tue Nov 8 16:16:30 UTC 2011 kill -USR1 6292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6292 killed at Tue Nov 8 16:16:30 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6360 >/dev/null 2>/dev/null selfserv_9519 with PID 6360 found at Tue Nov 8 16:16:30 UTC 2011 selfserv_9519 with PID 6360 started at Tue Nov 8 16:16:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2469: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6360 at Tue Nov 8 16:16:31 UTC 2011 kill -USR1 6360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6360 killed at Tue Nov 8 16:16:31 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6416 >/dev/null 2>/dev/null selfserv_9519 with PID 6416 found at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 with PID 6416 started at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2470: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6416 at Tue Nov 8 16:16:31 UTC 2011 kill -USR1 6416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6416 killed at Tue Nov 8 16:16:31 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6472 >/dev/null 2>/dev/null selfserv_9519 with PID 6472 found at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 with PID 6472 started at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2471: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6472 at Tue Nov 8 16:16:31 UTC 2011 kill -USR1 6472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6472 killed at Tue Nov 8 16:16:31 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6540 >/dev/null 2>/dev/null selfserv_9519 with PID 6540 found at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 with PID 6540 started at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2472: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6540 at Tue Nov 8 16:16:31 UTC 2011 kill -USR1 6540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6540 killed at Tue Nov 8 16:16:31 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6596 >/dev/null 2>/dev/null selfserv_9519 with PID 6596 found at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 with PID 6596 started at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2473: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6596 at Tue Nov 8 16:16:31 UTC 2011 kill -USR1 6596 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6596 killed at Tue Nov 8 16:16:31 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6652 >/dev/null 2>/dev/null selfserv_9519 with PID 6652 found at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 with PID 6652 started at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2474: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6652 at Tue Nov 8 16:16:31 UTC 2011 kill -USR1 6652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6652 killed at Tue Nov 8 16:16:31 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6720 >/dev/null 2>/dev/null selfserv_9519 with PID 6720 found at Tue Nov 8 16:16:31 UTC 2011 selfserv_9519 with PID 6720 started at Tue Nov 8 16:16:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2475: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6720 at Tue Nov 8 16:16:32 UTC 2011 kill -USR1 6720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6720 killed at Tue Nov 8 16:16:32 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6776 >/dev/null 2>/dev/null selfserv_9519 with PID 6776 found at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 with PID 6776 started at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2476: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6776 at Tue Nov 8 16:16:32 UTC 2011 kill -USR1 6776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6776 killed at Tue Nov 8 16:16:32 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6832 >/dev/null 2>/dev/null selfserv_9519 with PID 6832 found at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 with PID 6832 started at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2477: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6832 at Tue Nov 8 16:16:32 UTC 2011 kill -USR1 6832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6832 killed at Tue Nov 8 16:16:32 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6900 >/dev/null 2>/dev/null selfserv_9519 with PID 6900 found at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 with PID 6900 started at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2478: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6900 at Tue Nov 8 16:16:32 UTC 2011 kill -USR1 6900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6900 killed at Tue Nov 8 16:16:32 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6956 >/dev/null 2>/dev/null selfserv_9519 with PID 6956 found at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 with PID 6956 started at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2479: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6956 at Tue Nov 8 16:16:32 UTC 2011 kill -USR1 6956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6956 killed at Tue Nov 8 16:16:32 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7012 >/dev/null 2>/dev/null selfserv_9519 with PID 7012 found at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 with PID 7012 started at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #2480: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 7012 at Tue Nov 8 16:16:32 UTC 2011 kill -USR1 7012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7012 killed at Tue Nov 8 16:16:32 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7080 >/dev/null 2>/dev/null selfserv_9519 with PID 7080 found at Tue Nov 8 16:16:32 UTC 2011 selfserv_9519 with PID 7080 started at Tue Nov 8 16:16:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2481: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7080 at Tue Nov 8 16:16:32 UTC 2011 kill -USR1 7080 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7080 killed at Tue Nov 8 16:16:33 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7136 >/dev/null 2>/dev/null selfserv_9519 with PID 7136 found at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 with PID 7136 started at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2482: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7136 at Tue Nov 8 16:16:33 UTC 2011 kill -USR1 7136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7136 killed at Tue Nov 8 16:16:33 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7192 >/dev/null 2>/dev/null selfserv_9519 with PID 7192 found at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 with PID 7192 started at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2483: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7192 at Tue Nov 8 16:16:33 UTC 2011 kill -USR1 7192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7192 killed at Tue Nov 8 16:16:33 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7260 >/dev/null 2>/dev/null selfserv_9519 with PID 7260 found at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 with PID 7260 started at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2484: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7260 at Tue Nov 8 16:16:33 UTC 2011 kill -USR1 7260 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7260 killed at Tue Nov 8 16:16:33 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7316 >/dev/null 2>/dev/null selfserv_9519 with PID 7316 found at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 with PID 7316 started at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2485: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7316 at Tue Nov 8 16:16:33 UTC 2011 kill -USR1 7316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7316 killed at Tue Nov 8 16:16:33 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7372 >/dev/null 2>/dev/null selfserv_9519 with PID 7372 found at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 with PID 7372 started at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2486: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7372 at Tue Nov 8 16:16:33 UTC 2011 kill -USR1 7372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7372 killed at Tue Nov 8 16:16:33 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7440 >/dev/null 2>/dev/null selfserv_9519 with PID 7440 found at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 with PID 7440 started at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2487: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7440 at Tue Nov 8 16:16:33 UTC 2011 kill -USR1 7440 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7440 killed at Tue Nov 8 16:16:33 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7496 >/dev/null 2>/dev/null selfserv_9519 with PID 7496 found at Tue Nov 8 16:16:33 UTC 2011 selfserv_9519 with PID 7496 started at Tue Nov 8 16:16:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2488: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 7496 at Tue Nov 8 16:16:34 UTC 2011 kill -USR1 7496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7496 killed at Tue Nov 8 16:16:34 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7552 >/dev/null 2>/dev/null selfserv_9519 with PID 7552 found at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 with PID 7552 started at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2489: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7552 at Tue Nov 8 16:16:34 UTC 2011 kill -USR1 7552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7552 killed at Tue Nov 8 16:16:34 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7620 >/dev/null 2>/dev/null selfserv_9519 with PID 7620 found at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 with PID 7620 started at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2490: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7620 at Tue Nov 8 16:16:34 UTC 2011 kill -USR1 7620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7620 killed at Tue Nov 8 16:16:34 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7676 >/dev/null 2>/dev/null selfserv_9519 with PID 7676 found at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 with PID 7676 started at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2491: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7676 at Tue Nov 8 16:16:34 UTC 2011 kill -USR1 7676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7676 killed at Tue Nov 8 16:16:34 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7732 >/dev/null 2>/dev/null selfserv_9519 with PID 7732 found at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 with PID 7732 started at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2492: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7732 at Tue Nov 8 16:16:34 UTC 2011 kill -USR1 7732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7732 killed at Tue Nov 8 16:16:34 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7800 >/dev/null 2>/dev/null selfserv_9519 with PID 7800 found at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 with PID 7800 started at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2493: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7800 at Tue Nov 8 16:16:34 UTC 2011 kill -USR1 7800 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7800 killed at Tue Nov 8 16:16:34 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7856 >/dev/null 2>/dev/null selfserv_9519 with PID 7856 found at Tue Nov 8 16:16:34 UTC 2011 selfserv_9519 with PID 7856 started at Tue Nov 8 16:16:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2494: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7856 at Tue Nov 8 16:16:35 UTC 2011 kill -USR1 7856 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7856 killed at Tue Nov 8 16:16:35 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7912 >/dev/null 2>/dev/null selfserv_9519 with PID 7912 found at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 with PID 7912 started at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2495: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7912 at Tue Nov 8 16:16:35 UTC 2011 kill -USR1 7912 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7912 killed at Tue Nov 8 16:16:35 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 7980 >/dev/null 2>/dev/null selfserv_9519 with PID 7980 found at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 with PID 7980 started at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2496: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 7980 at Tue Nov 8 16:16:35 UTC 2011 kill -USR1 7980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 7980 killed at Tue Nov 8 16:16:35 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8036 >/dev/null 2>/dev/null selfserv_9519 with PID 8036 found at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 with PID 8036 started at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2497: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8036 at Tue Nov 8 16:16:35 UTC 2011 kill -USR1 8036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8036 killed at Tue Nov 8 16:16:35 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8092 >/dev/null 2>/dev/null selfserv_9519 with PID 8092 found at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 with PID 8092 started at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2498: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8092 at Tue Nov 8 16:16:35 UTC 2011 kill -USR1 8092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8092 killed at Tue Nov 8 16:16:35 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8160 >/dev/null 2>/dev/null selfserv_9519 with PID 8160 found at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 with PID 8160 started at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2499: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8160 at Tue Nov 8 16:16:35 UTC 2011 kill -USR1 8160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8160 killed at Tue Nov 8 16:16:35 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8216 >/dev/null 2>/dev/null selfserv_9519 with PID 8216 found at Tue Nov 8 16:16:35 UTC 2011 selfserv_9519 with PID 8216 started at Tue Nov 8 16:16:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2500: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8216 at Tue Nov 8 16:16:36 UTC 2011 kill -USR1 8216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8216 killed at Tue Nov 8 16:16:36 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8272 >/dev/null 2>/dev/null selfserv_9519 with PID 8272 found at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 with PID 8272 started at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2501: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8272 at Tue Nov 8 16:16:36 UTC 2011 kill -USR1 8272 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8272 killed at Tue Nov 8 16:16:36 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8340 >/dev/null 2>/dev/null selfserv_9519 with PID 8340 found at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 with PID 8340 started at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2502: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8340 at Tue Nov 8 16:16:36 UTC 2011 kill -USR1 8340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8340 killed at Tue Nov 8 16:16:36 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8396 >/dev/null 2>/dev/null selfserv_9519 with PID 8396 found at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 with PID 8396 started at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2503: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8396 at Tue Nov 8 16:16:36 UTC 2011 kill -USR1 8396 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8396 killed at Tue Nov 8 16:16:36 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8453 >/dev/null 2>/dev/null selfserv_9519 with PID 8453 found at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 with PID 8453 started at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2504: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8453 at Tue Nov 8 16:16:36 UTC 2011 kill -USR1 8453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8453 killed at Tue Nov 8 16:16:36 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8521 >/dev/null 2>/dev/null selfserv_9519 with PID 8521 found at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 with PID 8521 started at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2505: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8521 at Tue Nov 8 16:16:36 UTC 2011 kill -USR1 8521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8521 killed at Tue Nov 8 16:16:36 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8577 >/dev/null 2>/dev/null selfserv_9519 with PID 8577 found at Tue Nov 8 16:16:36 UTC 2011 selfserv_9519 with PID 8577 started at Tue Nov 8 16:16:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2506: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 8577 at Tue Nov 8 16:16:36 UTC 2011 kill -USR1 8577 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8577 killed at Tue Nov 8 16:16:36 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8633 >/dev/null 2>/dev/null selfserv_9519 with PID 8633 found at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 with PID 8633 started at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2507: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8633 at Tue Nov 8 16:16:37 UTC 2011 kill -USR1 8633 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8633 killed at Tue Nov 8 16:16:37 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8702 >/dev/null 2>/dev/null selfserv_9519 with PID 8702 found at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 with PID 8702 started at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2508: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8702 at Tue Nov 8 16:16:37 UTC 2011 kill -USR1 8702 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8702 killed at Tue Nov 8 16:16:37 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8758 >/dev/null 2>/dev/null selfserv_9519 with PID 8758 found at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 with PID 8758 started at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2509: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8758 at Tue Nov 8 16:16:37 UTC 2011 kill -USR1 8758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8758 killed at Tue Nov 8 16:16:37 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8814 >/dev/null 2>/dev/null selfserv_9519 with PID 8814 found at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 with PID 8814 started at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2510: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8814 at Tue Nov 8 16:16:37 UTC 2011 kill -USR1 8814 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8814 killed at Tue Nov 8 16:16:37 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8882 >/dev/null 2>/dev/null selfserv_9519 with PID 8882 found at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 with PID 8882 started at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2511: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8882 at Tue Nov 8 16:16:37 UTC 2011 kill -USR1 8882 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8882 killed at Tue Nov 8 16:16:37 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8938 >/dev/null 2>/dev/null selfserv_9519 with PID 8938 found at Tue Nov 8 16:16:37 UTC 2011 selfserv_9519 with PID 8938 started at Tue Nov 8 16:16:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2512: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8938 at Tue Nov 8 16:16:37 UTC 2011 kill -USR1 8938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8938 killed at Tue Nov 8 16:16:37 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8994 >/dev/null 2>/dev/null selfserv_9519 with PID 8994 found at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 with PID 8994 started at Tue Nov 8 16:16:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2513: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 8994 at Tue Nov 8 16:16:38 UTC 2011 kill -USR1 8994 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8994 killed at Tue Nov 8 16:16:38 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9062 >/dev/null 2>/dev/null selfserv_9519 with PID 9062 found at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 with PID 9062 started at Tue Nov 8 16:16:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2514: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 9062 at Tue Nov 8 16:16:38 UTC 2011 kill -USR1 9062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9062 killed at Tue Nov 8 16:16:38 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9118 >/dev/null 2>/dev/null selfserv_9519 with PID 9118 found at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 with PID 9118 started at Tue Nov 8 16:16:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2515: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 9118 at Tue Nov 8 16:16:38 UTC 2011 kill -USR1 9118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9118 killed at Tue Nov 8 16:16:38 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9174 >/dev/null 2>/dev/null selfserv_9519 with PID 9174 found at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 with PID 9174 started at Tue Nov 8 16:16:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #2516: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 9174 at Tue Nov 8 16:16:38 UTC 2011 kill -USR1 9174 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9174 killed at Tue Nov 8 16:16:38 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9519 starting at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:38 UTC 2011 selfserv_9519 with PID 9246 started at Tue Nov 8 16:16:38 UTC 2011 Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:38 UTC 2011 ssl.sh: #2517: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:38 UTC 2011 ssl.sh: #2518: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:38 UTC 2011 ssl.sh: #2519: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:38 UTC 2011 ssl.sh: #2520: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:38 UTC 2011 ssl.sh: #2521: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2522: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2523: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2524: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2525: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2526: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2527: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2528: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2529: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2530: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2531: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2532: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2533: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2534: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2535: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2536: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2537: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2538: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2539: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2540: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:39 UTC 2011 ssl.sh: #2541: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2542: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2543: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2544: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2545: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2546: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2547: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2548: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2549: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2550: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2551: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2552: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2553: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2554: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2555: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2556: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 9246 >/dev/null 2>/dev/null selfserv_9519 with PID 9246 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2557: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 9246 at Tue Nov 8 16:16:40 UTC 2011 kill -USR1 9246 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9246 killed at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:40 UTC 2011 selfserv_9519 with PID 10673 started at Tue Nov 8 16:16:40 UTC 2011 Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2558: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:40 UTC 2011 ssl.sh: #2559: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2560: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2561: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2562: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2563: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2564: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2565: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2566: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2567: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2568: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2569: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2570: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2571: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2572: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2573: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2574: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2575: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2576: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2577: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2578: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:41 UTC 2011 ssl.sh: #2579: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2580: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2581: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2582: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2583: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2584: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2585: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2586: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2587: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2588: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2589: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2590: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2591: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2592: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2593: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2594: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2595: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2596: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2597: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 10673 >/dev/null 2>/dev/null selfserv_9519 with PID 10673 found at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: #2598: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 10673 at Tue Nov 8 16:16:42 UTC 2011 kill -USR1 10673 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 10673 killed at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:42 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:42 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12093 >/dev/null 2>/dev/null selfserv_9519 with PID 12093 found at Tue Nov 8 16:16:42 UTC 2011 selfserv_9519 with PID 12093 started at Tue Nov 8 16:16:42 UTC 2011 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 12093 at Tue Nov 8 16:16:42 UTC 2011 kill -USR1 12093 ./ssl.sh: line 207: 12093 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12093 killed at Tue Nov 8 16:16:42 UTC 2011 selfserv_9519 starting at Tue Nov 8 16:16:42 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:42 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 selfserv_9519 with PID 12135 started at Tue Nov 8 16:16:43 UTC 2011 Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2599: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2600: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2601: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2602: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2603: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2604: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2605: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2606: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2607: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2608: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2609: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2610: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2611: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2612: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2613: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2614: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:43 UTC 2011 ssl.sh: #2615: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2616: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2617: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2618: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2619: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2620: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2621: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2622: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2623: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2624: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2625: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2626: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2627: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2628: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2629: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2630: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2631: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2632: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2633: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2634: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:44 UTC 2011 ssl.sh: #2635: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2636: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2637: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2638: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12135 >/dev/null 2>/dev/null selfserv_9519 with PID 12135 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2639: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12135 at Tue Nov 8 16:16:45 UTC 2011 kill -USR1 12135 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12135 killed at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 selfserv_9519 with PID 13556 started at Tue Nov 8 16:16:45 UTC 2011 Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2640: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2641: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2642: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2643: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2644: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2645: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2646: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2647: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2648: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2649: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2650: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:45 UTC 2011 ssl.sh: #2651: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2652: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2653: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2654: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2655: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2656: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2657: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2658: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2659: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2660: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2661: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2662: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2663: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2664: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2665: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2666: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2667: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2668: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2669: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2670: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:46 UTC 2011 ssl.sh: #2671: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2672: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2673: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2674: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2675: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2676: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2677: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2678: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2679: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 13556 >/dev/null 2>/dev/null selfserv_9519 with PID 13556 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2680: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 13556 at Tue Nov 8 16:16:47 UTC 2011 kill -USR1 13556 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13556 killed at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:47 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14976 >/dev/null 2>/dev/null selfserv_9519 with PID 14976 found at Tue Nov 8 16:16:47 UTC 2011 selfserv_9519 with PID 14976 started at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 14976 at Tue Nov 8 16:16:47 UTC 2011 kill -USR1 14976 ./ssl.sh: line 207: 14976 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14976 killed at Tue Nov 8 16:16:47 UTC 2011 selfserv_9519 starting at Tue Nov 8 16:16:47 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:47 UTC 2011 selfserv_9519 with PID 15018 started at Tue Nov 8 16:16:47 UTC 2011 Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2681: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2682: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2683: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2684: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2685: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:47 UTC 2011 ssl.sh: #2686: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2687: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2688: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2689: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2690: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2691: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2692: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2693: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2694: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2695: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2696: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2697: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2698: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2699: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2700: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2701: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2702: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2703: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2704: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:48 UTC 2011 ssl.sh: #2705: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2706: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2707: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2708: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2709: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2710: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2711: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2712: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2713: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2714: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2715: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2716: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2717: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2718: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2719: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2720: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 15018 >/dev/null 2>/dev/null selfserv_9519 with PID 15018 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2721: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15018 at Tue Nov 8 16:16:49 UTC 2011 kill -USR1 15018 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15018 killed at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:49 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:49 UTC 2011 selfserv_9519 with PID 16442 started at Tue Nov 8 16:16:49 UTC 2011 Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:49 UTC 2011 ssl.sh: #2722: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2723: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2724: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2725: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2726: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2727: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2728: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2729: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2730: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2731: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2732: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2733: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2734: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2735: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2736: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2737: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2738: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2739: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2740: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:50 UTC 2011 ssl.sh: #2741: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2742: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2743: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2744: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2745: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2746: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2747: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2748: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 114 bytes tstclnt: Writing 114 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #2749: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2750: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2751: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2752: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2753: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2754: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2755: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2756: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2757: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2758: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2759: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:51 UTC 2011 ssl.sh: #2760: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:52 UTC 2011 ssl.sh: #2761: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 16442 >/dev/null 2>/dev/null selfserv_9519 with PID 16442 found at Tue Nov 8 16:16:52 UTC 2011 ssl.sh: #2762: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16442 at Tue Nov 8 16:16:52 UTC 2011 kill -USR1 16442 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16442 killed at Tue Nov 8 16:16:52 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17876 >/dev/null 2>/dev/null selfserv_9519 with PID 17876 found at Tue Nov 8 16:16:52 UTC 2011 selfserv_9519 with PID 17876 started at Tue Nov 8 16:16:52 UTC 2011 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 17876 at Tue Nov 8 16:16:52 UTC 2011 kill -USR1 17876 ./ssl.sh: line 207: 17876 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17876 killed at Tue Nov 8 16:16:52 UTC 2011 ssl.sh: SSL Cipher Coverage - server bypass/client bypass =============================== selfserv_9519 starting at Tue Nov 8 16:16:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 selfserv_9519 with PID 17924 started at Tue Nov 8 16:16:52 UTC 2011 ssl.sh: running SSL2_RC4_128_WITH_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c A -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2763: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c B -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2764: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c C -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2765: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c D -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2766: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c E -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2767: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c F -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: N/A subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2768: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2769: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2770: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2771: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2772: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2773: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2774: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2775: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2776: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2777: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2778: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2779: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2780: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2781: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2782: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2783: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2784: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2785: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2786: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2787: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2788: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2789: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2790: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2791: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2792: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2793: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2794: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2795: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 17924 >/dev/null 2>/dev/null selfserv_9519 with PID 17924 found at Tue Nov 8 16:16:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -B -s \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2796: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 17924 at Tue Nov 8 16:16:53 UTC 2011 kill -USR1 17924 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17924 killed at Tue Nov 8 16:16:53 UTC 2011 ssl.sh: SSL Client Authentication - server bypass/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19510 >/dev/null 2>/dev/null selfserv_9519 with PID 19510 found at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 with PID 19510 started at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2797: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 19510 at Tue Nov 8 16:16:54 UTC 2011 kill -USR1 19510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19510 killed at Tue Nov 8 16:16:54 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19567 >/dev/null 2>/dev/null selfserv_9519 with PID 19567 found at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 with PID 19567 started at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2798: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 19567 at Tue Nov 8 16:16:54 UTC 2011 kill -USR1 19567 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19567 killed at Tue Nov 8 16:16:54 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19624 >/dev/null 2>/dev/null selfserv_9519 with PID 19624 found at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 with PID 19624 started at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2799: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 19624 at Tue Nov 8 16:16:54 UTC 2011 kill -USR1 19624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19624 killed at Tue Nov 8 16:16:54 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19681 >/dev/null 2>/dev/null selfserv_9519 with PID 19681 found at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 with PID 19681 started at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2800: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 19681 at Tue Nov 8 16:16:54 UTC 2011 kill -USR1 19681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19681 killed at Tue Nov 8 16:16:54 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19738 >/dev/null 2>/dev/null selfserv_9519 with PID 19738 found at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 with PID 19738 started at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2801: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 19738 at Tue Nov 8 16:16:54 UTC 2011 kill -USR1 19738 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19738 killed at Tue Nov 8 16:16:54 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19795 >/dev/null 2>/dev/null selfserv_9519 with PID 19795 found at Tue Nov 8 16:16:54 UTC 2011 selfserv_9519 with PID 19795 started at Tue Nov 8 16:16:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2802: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 19795 at Tue Nov 8 16:16:55 UTC 2011 kill -USR1 19795 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19795 killed at Tue Nov 8 16:16:55 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19852 >/dev/null 2>/dev/null selfserv_9519 with PID 19852 found at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 with PID 19852 started at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2803: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 19852 at Tue Nov 8 16:16:55 UTC 2011 kill -USR1 19852 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19852 killed at Tue Nov 8 16:16:55 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19910 >/dev/null 2>/dev/null selfserv_9519 with PID 19910 found at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 with PID 19910 started at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2804: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 19910 at Tue Nov 8 16:16:55 UTC 2011 kill -USR1 19910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19910 killed at Tue Nov 8 16:16:55 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 19967 >/dev/null 2>/dev/null selfserv_9519 with PID 19967 found at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 with PID 19967 started at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2805: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 19967 at Tue Nov 8 16:16:55 UTC 2011 kill -USR1 19967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 19967 killed at Tue Nov 8 16:16:55 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20024 >/dev/null 2>/dev/null selfserv_9519 with PID 20024 found at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 with PID 20024 started at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2806: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 20024 at Tue Nov 8 16:16:55 UTC 2011 kill -USR1 20024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20024 killed at Tue Nov 8 16:16:55 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20081 >/dev/null 2>/dev/null selfserv_9519 with PID 20081 found at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 with PID 20081 started at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2807: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 20081 at Tue Nov 8 16:16:55 UTC 2011 kill -USR1 20081 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20081 killed at Tue Nov 8 16:16:55 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20138 >/dev/null 2>/dev/null selfserv_9519 with PID 20138 found at Tue Nov 8 16:16:55 UTC 2011 selfserv_9519 with PID 20138 started at Tue Nov 8 16:16:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2808: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20138 at Tue Nov 8 16:16:56 UTC 2011 kill -USR1 20138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20138 killed at Tue Nov 8 16:16:56 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20195 >/dev/null 2>/dev/null selfserv_9519 with PID 20195 found at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 with PID 20195 started at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2809: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20195 at Tue Nov 8 16:16:56 UTC 2011 kill -USR1 20195 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20195 killed at Tue Nov 8 16:16:56 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20252 >/dev/null 2>/dev/null selfserv_9519 with PID 20252 found at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 with PID 20252 started at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2810: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20252 at Tue Nov 8 16:16:56 UTC 2011 kill -USR1 20252 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20252 killed at Tue Nov 8 16:16:56 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20309 >/dev/null 2>/dev/null selfserv_9519 with PID 20309 found at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 with PID 20309 started at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2811: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20309 at Tue Nov 8 16:16:56 UTC 2011 kill -USR1 20309 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20309 killed at Tue Nov 8 16:16:56 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20366 >/dev/null 2>/dev/null selfserv_9519 with PID 20366 found at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 with PID 20366 started at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2812: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 20366 at Tue Nov 8 16:16:56 UTC 2011 kill -USR1 20366 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20366 killed at Tue Nov 8 16:16:56 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20423 >/dev/null 2>/dev/null selfserv_9519 with PID 20423 found at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 with PID 20423 started at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w bogus -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2813: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 20423 at Tue Nov 8 16:16:56 UTC 2011 kill -USR1 20423 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20423 killed at Tue Nov 8 16:16:56 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20480 >/dev/null 2>/dev/null selfserv_9519 with PID 20480 found at Tue Nov 8 16:16:56 UTC 2011 selfserv_9519 with PID 20480 started at Tue Nov 8 16:16:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2814: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20480 at Tue Nov 8 16:16:57 UTC 2011 kill -USR1 20480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20480 killed at Tue Nov 8 16:16:57 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20537 >/dev/null 2>/dev/null selfserv_9519 with PID 20537 found at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 with PID 20537 started at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2815: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20537 at Tue Nov 8 16:16:57 UTC 2011 kill -USR1 20537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20537 killed at Tue Nov 8 16:16:57 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20594 >/dev/null 2>/dev/null selfserv_9519 with PID 20594 found at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 with PID 20594 started at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2816: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20594 at Tue Nov 8 16:16:57 UTC 2011 kill -USR1 20594 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20594 killed at Tue Nov 8 16:16:57 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20651 >/dev/null 2>/dev/null selfserv_9519 with PID 20651 found at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 with PID 20651 started at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2817: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20651 at Tue Nov 8 16:16:57 UTC 2011 kill -USR1 20651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20651 killed at Tue Nov 8 16:16:57 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20708 >/dev/null 2>/dev/null selfserv_9519 with PID 20708 found at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 with PID 20708 started at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2818: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 20708 at Tue Nov 8 16:16:57 UTC 2011 kill -USR1 20708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20708 killed at Tue Nov 8 16:16:57 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20765 >/dev/null 2>/dev/null selfserv_9519 with PID 20765 found at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 with PID 20765 started at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2819: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 20765 at Tue Nov 8 16:16:57 UTC 2011 kill -USR1 20765 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20765 killed at Tue Nov 8 16:16:57 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20822 >/dev/null 2>/dev/null selfserv_9519 with PID 20822 found at Tue Nov 8 16:16:57 UTC 2011 selfserv_9519 with PID 20822 started at Tue Nov 8 16:16:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -n TestUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2820: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20822 at Tue Nov 8 16:16:57 UTC 2011 kill -USR1 20822 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20822 killed at Tue Nov 8 16:16:57 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20947 >/dev/null 2>/dev/null selfserv_9519 with PID 20947 found at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 with PID 20947 started at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2821: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 20947 at Tue Nov 8 16:16:58 UTC 2011 kill -USR1 20947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20947 killed at Tue Nov 8 16:16:58 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21010 >/dev/null 2>/dev/null selfserv_9519 with PID 21010 found at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 with PID 21010 started at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2822: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21010 at Tue Nov 8 16:16:58 UTC 2011 kill -USR1 21010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21010 killed at Tue Nov 8 16:16:58 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21073 >/dev/null 2>/dev/null selfserv_9519 with PID 21073 found at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 with PID 21073 started at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2823: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21073 at Tue Nov 8 16:16:58 UTC 2011 kill -USR1 21073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21073 killed at Tue Nov 8 16:16:58 UTC 2011 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21136 >/dev/null 2>/dev/null selfserv_9519 with PID 21136 found at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 with PID 21136 started at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2824: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21136 at Tue Nov 8 16:16:58 UTC 2011 kill -USR1 21136 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21136 killed at Tue Nov 8 16:16:58 UTC 2011 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9519 starting at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21199 >/dev/null 2>/dev/null selfserv_9519 with PID 21199 found at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 with PID 21199 started at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -T -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate. tstclnt: exiting with return code 254 ssl.sh: #2825: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21199 at Tue Nov 8 16:16:58 UTC 2011 kill -USR1 21199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21199 killed at Tue Nov 8 16:16:58 UTC 2011 ssl.sh: TLS Server hello response without SNI ---- selfserv_9519 starting at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21262 >/dev/null 2>/dev/null selfserv_9519 with PID 21262 found at Tue Nov 8 16:16:58 UTC 2011 selfserv_9519 with PID 21262 started at Tue Nov 8 16:16:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2826: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21262 at Tue Nov 8 16:16:59 UTC 2011 kill -USR1 21262 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21262 killed at Tue Nov 8 16:16:59 UTC 2011 ssl.sh: TLS Server hello response with SNI ---- selfserv_9519 starting at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21329 >/dev/null 2>/dev/null selfserv_9519 with PID 21329 found at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 with PID 21329 started at Tue Nov 8 16:16:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2827: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 21329 at Tue Nov 8 16:16:59 UTC 2011 kill -USR1 21329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21329 killed at Tue Nov 8 16:16:59 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21392 >/dev/null 2>/dev/null selfserv_9519 with PID 21392 found at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 with PID 21392 started at Tue Nov 8 16:16:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: exiting with return code 1 ssl.sh: #2828: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21392 at Tue Nov 8 16:16:59 UTC 2011 kill -USR1 21392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21392 killed at Tue Nov 8 16:16:59 UTC 2011 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9519 starting at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21455 >/dev/null 2>/dev/null selfserv_9519 with PID 21455 found at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 with PID 21455 started at Tue Nov 8 16:16:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 1 ssl.sh: #2829: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21455 at Tue Nov 8 16:16:59 UTC 2011 kill -USR1 21455 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21455 killed at Tue Nov 8 16:16:59 UTC 2011 ssl.sh: TLS Server response with alert ---- selfserv_9519 starting at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21518 >/dev/null 2>/dev/null selfserv_9519 with PID 21518 found at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 with PID 21518 started at Tue Nov 8 16:16:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v -B -s \ -2 -w nss -n TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name. tstclnt: exiting with return code 254 ssl.sh: #2830: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21518 at Tue Nov 8 16:16:59 UTC 2011 kill -USR1 21518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21518 killed at Tue Nov 8 16:16:59 UTC 2011 ssl.sh: SSL Stress Test - server bypass/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:16:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21867 >/dev/null 2>/dev/null selfserv_9519 with PID 21867 found at Tue Nov 8 16:16:59 UTC 2011 selfserv_9519 with PID 21867 started at Tue Nov 8 16:16:59 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Tue Nov 8 16:16:59 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Tue Nov 8 16:17:00 UTC 2011 ssl.sh: #2831: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 21867 at Tue Nov 8 16:17:00 UTC 2011 kill -USR1 21867 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21867 killed at Tue Nov 8 16:17:00 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:17:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21943 >/dev/null 2>/dev/null selfserv_9519 with PID 21943 found at Tue Nov 8 16:17:00 UTC 2011 selfserv_9519 with PID 21943 started at Tue Nov 8 16:17:00 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:00 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:00 UTC 2011 ssl.sh: #2832: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 21943 at Tue Nov 8 16:17:00 UTC 2011 kill -USR1 21943 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21943 killed at Tue Nov 8 16:17:00 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:17:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22019 >/dev/null 2>/dev/null selfserv_9519 with PID 22019 found at Tue Nov 8 16:17:00 UTC 2011 selfserv_9519 with PID 22019 started at Tue Nov 8 16:17:00 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:00 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:01 UTC 2011 ssl.sh: #2833: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22019 at Tue Nov 8 16:17:01 UTC 2011 kill -USR1 22019 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22019 killed at Tue Nov 8 16:17:01 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:17:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22095 >/dev/null 2>/dev/null selfserv_9519 with PID 22095 found at Tue Nov 8 16:17:01 UTC 2011 selfserv_9519 with PID 22095 started at Tue Nov 8 16:17:01 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:01 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:01 UTC 2011 ssl.sh: #2834: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22095 at Tue Nov 8 16:17:01 UTC 2011 kill -USR1 22095 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22095 killed at Tue Nov 8 16:17:01 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:17:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22171 >/dev/null 2>/dev/null selfserv_9519 with PID 22171 found at Tue Nov 8 16:17:01 UTC 2011 selfserv_9519 with PID 22171 started at Tue Nov 8 16:17:01 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:01 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:17:01 UTC 2011 ssl.sh: #2835: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22171 at Tue Nov 8 16:17:01 UTC 2011 kill -USR1 22171 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22171 killed at Tue Nov 8 16:17:01 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:17:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22247 >/dev/null 2>/dev/null selfserv_9519 with PID 22247 found at Tue Nov 8 16:17:01 UTC 2011 selfserv_9519 with PID 22247 started at Tue Nov 8 16:17:01 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:01 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:02 UTC 2011 ssl.sh: #2836: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22247 at Tue Nov 8 16:17:02 UTC 2011 kill -USR1 22247 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22247 killed at Tue Nov 8 16:17:02 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:17:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22323 >/dev/null 2>/dev/null selfserv_9519 with PID 22323 found at Tue Nov 8 16:17:02 UTC 2011 selfserv_9519 with PID 22323 started at Tue Nov 8 16:17:02 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:02 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:17:02 UTC 2011 ssl.sh: #2837: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22323 at Tue Nov 8 16:17:02 UTC 2011 kill -USR1 22323 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22323 killed at Tue Nov 8 16:17:02 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:17:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22399 >/dev/null 2>/dev/null selfserv_9519 with PID 22399 found at Tue Nov 8 16:17:02 UTC 2011 selfserv_9519 with PID 22399 started at Tue Nov 8 16:17:02 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:02 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:17:02 UTC 2011 ssl.sh: #2838: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22399 at Tue Nov 8 16:17:03 UTC 2011 kill -USR1 22399 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22399 killed at Tue Nov 8 16:17:03 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9519 starting at Tue Nov 8 16:17:03 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22481 >/dev/null 2>/dev/null selfserv_9519 with PID 22481 found at Tue Nov 8 16:17:03 UTC 2011 selfserv_9519 with PID 22481 started at Tue Nov 8 16:17:03 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:03 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:17:03 UTC 2011 ssl.sh: #2839: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22481 at Tue Nov 8 16:17:03 UTC 2011 kill -USR1 22481 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22481 killed at Tue Nov 8 16:17:03 UTC 2011 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:03 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22578 >/dev/null 2>/dev/null selfserv_9519 with PID 22578 found at Tue Nov 8 16:17:03 UTC 2011 selfserv_9519 with PID 22578 started at Tue Nov 8 16:17:03 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:03 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:17:04 UTC 2011 ssl.sh: #2840: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22578 at Tue Nov 8 16:17:04 UTC 2011 kill -USR1 22578 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22578 killed at Tue Nov 8 16:17:04 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:04 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:04 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22653 >/dev/null 2>/dev/null selfserv_9519 with PID 22653 found at Tue Nov 8 16:17:04 UTC 2011 selfserv_9519 with PID 22653 started at Tue Nov 8 16:17:04 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:04 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:17:04 UTC 2011 ssl.sh: #2841: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22653 at Tue Nov 8 16:17:04 UTC 2011 kill -USR1 22653 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22653 killed at Tue Nov 8 16:17:04 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:04 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:04 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22728 >/dev/null 2>/dev/null selfserv_9519 with PID 22728 found at Tue Nov 8 16:17:04 UTC 2011 selfserv_9519 with PID 22728 started at Tue Nov 8 16:17:04 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:04 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:17:04 UTC 2011 ssl.sh: #2842: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22728 at Tue Nov 8 16:17:04 UTC 2011 kill -USR1 22728 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22728 killed at Tue Nov 8 16:17:04 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:04 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:04 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22803 >/dev/null 2>/dev/null selfserv_9519 with PID 22803 found at Tue Nov 8 16:17:04 UTC 2011 selfserv_9519 with PID 22803 started at Tue Nov 8 16:17:04 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:04 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: #2843: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22803 at Tue Nov 8 16:17:05 UTC 2011 kill -USR1 22803 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22803 killed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22879 >/dev/null 2>/dev/null selfserv_9519 with PID 22879 found at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 with PID 22879 started at Tue Nov 8 16:17:05 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: #2844: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22879 at Tue Nov 8 16:17:05 UTC 2011 kill -USR1 22879 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22879 killed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22955 >/dev/null 2>/dev/null selfserv_9519 with PID 22955 found at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 with PID 22955 started at Tue Nov 8 16:17:05 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: #2845: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 22955 at Tue Nov 8 16:17:05 UTC 2011 kill -USR1 22955 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22955 killed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23031 >/dev/null 2>/dev/null selfserv_9519 with PID 23031 found at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 with PID 23031 started at Tue Nov 8 16:17:05 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: #2846: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 23031 at Tue Nov 8 16:17:05 UTC 2011 kill -USR1 23031 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23031 killed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23107 >/dev/null 2>/dev/null selfserv_9519 with PID 23107 found at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 with PID 23107 started at Tue Nov 8 16:17:05 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: #2847: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 23107 at Tue Nov 8 16:17:05 UTC 2011 kill -USR1 23107 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23107 killed at Tue Nov 8 16:17:05 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9519 starting at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23189 >/dev/null 2>/dev/null selfserv_9519 with PID 23189 found at Tue Nov 8 16:17:05 UTC 2011 selfserv_9519 with PID 23189 started at Tue Nov 8 16:17:05 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:17:06 UTC 2011 ssl.sh: #2848: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 23189 at Tue Nov 8 16:17:06 UTC 2011 kill -USR1 23189 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23189 killed at Tue Nov 8 16:17:06 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9519 starting at Tue Nov 8 16:17:06 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23271 >/dev/null 2>/dev/null selfserv_9519 with PID 23271 found at Tue Nov 8 16:17:06 UTC 2011 selfserv_9519 with PID 23271 started at Tue Nov 8 16:17:06 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:06 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:17:06 UTC 2011 ssl.sh: #2849: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 23271 at Tue Nov 8 16:17:06 UTC 2011 kill -USR1 23271 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23271 killed at Tue Nov 8 16:17:06 UTC 2011 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass =============================== selfserv_9519 starting at Tue Nov 8 16:17:06 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -c ABCDEF:0041:0084cdefgijklmnvyz -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:06 UTC 2011 selfserv_9519 with PID 23424 started at Tue Nov 8 16:17:06 UTC 2011 ssl.sh: skipping SSL2_RC4_128_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_64_CBC_WITH_MD5 for Extended Test ssl.sh: skipping SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2850: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2851: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2852: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2853: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2854: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2855: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2856: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2857: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2858: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2859: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2860: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2861: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2862: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -T -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2863: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c c -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2864: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c d -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2865: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c e -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2866: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c f -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2867: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c g -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2868: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c i -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2869: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c j -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2870: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c k -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2871: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c l -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2872: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c m -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2873: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c n -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2874: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c v -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2875: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c y -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2876: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- kill -0 23424 >/dev/null 2>/dev/null selfserv_9519 with PID 23424 found at Tue Nov 8 16:17:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -c z -B -s \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2877: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_NULL_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_RC4_128_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ECC only) ssl.sh: skipping TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ECC only) trying to kill selfserv_9519 with PID 23424 at Tue Nov 8 16:17:08 UTC 2011 kill -USR1 23424 selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23424 killed at Tue Nov 8 16:17:08 UTC 2011 ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 24895 >/dev/null 2>/dev/null selfserv_9519 with PID 24895 found at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 with PID 24895 started at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2878: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 24895 at Tue Nov 8 16:17:08 UTC 2011 kill -USR1 24895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 24895 killed at Tue Nov 8 16:17:08 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 24952 >/dev/null 2>/dev/null selfserv_9519 with PID 24952 found at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 with PID 24952 started at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2879: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 24952 at Tue Nov 8 16:17:08 UTC 2011 kill -USR1 24952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 24952 killed at Tue Nov 8 16:17:08 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25009 >/dev/null 2>/dev/null selfserv_9519 with PID 25009 found at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 with PID 25009 started at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2880: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25009 at Tue Nov 8 16:17:08 UTC 2011 kill -USR1 25009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25009 killed at Tue Nov 8 16:17:08 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25067 >/dev/null 2>/dev/null selfserv_9519 with PID 25067 found at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 with PID 25067 started at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2881: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25067 at Tue Nov 8 16:17:08 UTC 2011 kill -USR1 25067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25067 killed at Tue Nov 8 16:17:08 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25128 >/dev/null 2>/dev/null selfserv_9519 with PID 25128 found at Tue Nov 8 16:17:08 UTC 2011 selfserv_9519 with PID 25128 started at Tue Nov 8 16:17:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2882: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25128 at Tue Nov 8 16:17:09 UTC 2011 kill -USR1 25128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25128 killed at Tue Nov 8 16:17:09 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25185 >/dev/null 2>/dev/null selfserv_9519 with PID 25185 found at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 with PID 25185 started at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2883: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25185 at Tue Nov 8 16:17:09 UTC 2011 kill -USR1 25185 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25185 killed at Tue Nov 8 16:17:09 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25242 >/dev/null 2>/dev/null selfserv_9519 with PID 25242 found at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 with PID 25242 started at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2884: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25242 at Tue Nov 8 16:17:09 UTC 2011 kill -USR1 25242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25242 killed at Tue Nov 8 16:17:09 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25299 >/dev/null 2>/dev/null selfserv_9519 with PID 25299 found at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 with PID 25299 started at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2885: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25299 at Tue Nov 8 16:17:09 UTC 2011 kill -USR1 25299 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25299 killed at Tue Nov 8 16:17:09 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25356 >/dev/null 2>/dev/null selfserv_9519 with PID 25356 found at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 with PID 25356 started at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2886: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25356 at Tue Nov 8 16:17:09 UTC 2011 kill -USR1 25356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25356 killed at Tue Nov 8 16:17:09 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25413 >/dev/null 2>/dev/null selfserv_9519 with PID 25413 found at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 with PID 25413 started at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2887: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25413 at Tue Nov 8 16:17:09 UTC 2011 kill -USR1 25413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25413 killed at Tue Nov 8 16:17:09 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25470 >/dev/null 2>/dev/null selfserv_9519 with PID 25470 found at Tue Nov 8 16:17:09 UTC 2011 selfserv_9519 with PID 25470 started at Tue Nov 8 16:17:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #2888: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25470 at Tue Nov 8 16:17:10 UTC 2011 kill -USR1 25470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25470 killed at Tue Nov 8 16:17:10 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25527 >/dev/null 2>/dev/null selfserv_9519 with PID 25527 found at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 with PID 25527 started at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2889: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25527 at Tue Nov 8 16:17:10 UTC 2011 kill -USR1 25527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25527 killed at Tue Nov 8 16:17:10 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25584 >/dev/null 2>/dev/null selfserv_9519 with PID 25584 found at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 with PID 25584 started at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2890: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25584 at Tue Nov 8 16:17:10 UTC 2011 kill -USR1 25584 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25584 killed at Tue Nov 8 16:17:10 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25641 >/dev/null 2>/dev/null selfserv_9519 with PID 25641 found at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 with PID 25641 started at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2891: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25641 at Tue Nov 8 16:17:10 UTC 2011 kill -USR1 25641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25641 killed at Tue Nov 8 16:17:10 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25698 >/dev/null 2>/dev/null selfserv_9519 with PID 25698 found at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 with PID 25698 started at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2892: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25698 at Tue Nov 8 16:17:10 UTC 2011 kill -USR1 25698 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25698 killed at Tue Nov 8 16:17:10 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25755 >/dev/null 2>/dev/null selfserv_9519 with PID 25755 found at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 with PID 25755 started at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2893: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25755 at Tue Nov 8 16:17:10 UTC 2011 kill -USR1 25755 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25755 killed at Tue Nov 8 16:17:10 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25812 >/dev/null 2>/dev/null selfserv_9519 with PID 25812 found at Tue Nov 8 16:17:10 UTC 2011 selfserv_9519 with PID 25812 started at Tue Nov 8 16:17:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w bogus -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2894: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 25812 at Tue Nov 8 16:17:11 UTC 2011 kill -USR1 25812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25812 killed at Tue Nov 8 16:17:11 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25869 >/dev/null 2>/dev/null selfserv_9519 with PID 25869 found at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 with PID 25869 started at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -w nss -n ExtendedSSLUser < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2895: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25869 at Tue Nov 8 16:17:11 UTC 2011 kill -USR1 25869 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25869 killed at Tue Nov 8 16:17:11 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25926 >/dev/null 2>/dev/null selfserv_9519 with PID 25926 found at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 with PID 25926 started at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2896: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25926 at Tue Nov 8 16:17:11 UTC 2011 kill -USR1 25926 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25926 killed at Tue Nov 8 16:17:11 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25983 >/dev/null 2>/dev/null selfserv_9519 with PID 25983 found at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 with PID 25983 started at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2897: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 25983 at Tue Nov 8 16:17:11 UTC 2011 kill -USR1 25983 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25983 killed at Tue Nov 8 16:17:11 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26040 >/dev/null 2>/dev/null selfserv_9519 with PID 26040 found at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 with PID 26040 started at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2898: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26040 at Tue Nov 8 16:17:11 UTC 2011 kill -USR1 26040 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26040 killed at Tue Nov 8 16:17:11 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26097 >/dev/null 2>/dev/null selfserv_9519 with PID 26097 found at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 with PID 26097 started at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2899: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 26097 at Tue Nov 8 16:17:11 UTC 2011 kill -USR1 26097 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26097 killed at Tue Nov 8 16:17:11 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26154 >/dev/null 2>/dev/null selfserv_9519 with PID 26154 found at Tue Nov 8 16:17:11 UTC 2011 selfserv_9519 with PID 26154 started at Tue Nov 8 16:17:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #2900: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 26154 at Tue Nov 8 16:17:12 UTC 2011 kill -USR1 26154 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26154 killed at Tue Nov 8 16:17:12 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26211 >/dev/null 2>/dev/null selfserv_9519 with PID 26211 found at Tue Nov 8 16:17:12 UTC 2011 selfserv_9519 with PID 26211 started at Tue Nov 8 16:17:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../ext_client -v -B -s \ -2 -T -n ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2901: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 26211 at Tue Nov 8 16:17:12 UTC 2011 kill -USR1 26211 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26211 killed at Tue Nov 8 16:17:12 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:17:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26646 >/dev/null 2>/dev/null selfserv_9519 with PID 26646 found at Tue Nov 8 16:17:12 UTC 2011 selfserv_9519 with PID 26646 started at Tue Nov 8 16:17:12 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:12 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:12 UTC 2011 ssl.sh: #2902: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26646 at Tue Nov 8 16:17:12 UTC 2011 kill -USR1 26646 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26646 killed at Tue Nov 8 16:17:12 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:17:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26722 >/dev/null 2>/dev/null selfserv_9519 with PID 26722 found at Tue Nov 8 16:17:12 UTC 2011 selfserv_9519 with PID 26722 started at Tue Nov 8 16:17:12 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:12 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:13 UTC 2011 ssl.sh: #2903: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26722 at Tue Nov 8 16:17:13 UTC 2011 kill -USR1 26722 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26722 killed at Tue Nov 8 16:17:13 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:17:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26798 >/dev/null 2>/dev/null selfserv_9519 with PID 26798 found at Tue Nov 8 16:17:13 UTC 2011 selfserv_9519 with PID 26798 started at Tue Nov 8 16:17:13 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:13 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:13 UTC 2011 ssl.sh: #2904: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26798 at Tue Nov 8 16:17:13 UTC 2011 kill -USR1 26798 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26798 killed at Tue Nov 8 16:17:13 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:17:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26874 >/dev/null 2>/dev/null selfserv_9519 with PID 26874 found at Tue Nov 8 16:17:13 UTC 2011 selfserv_9519 with PID 26874 started at Tue Nov 8 16:17:13 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:13 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:17:13 UTC 2011 ssl.sh: #2905: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26874 at Tue Nov 8 16:17:13 UTC 2011 kill -USR1 26874 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26874 killed at Tue Nov 8 16:17:13 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:17:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26950 >/dev/null 2>/dev/null selfserv_9519 with PID 26950 found at Tue Nov 8 16:17:13 UTC 2011 selfserv_9519 with PID 26950 started at Tue Nov 8 16:17:13 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:13 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:14 UTC 2011 ssl.sh: #2906: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26950 at Tue Nov 8 16:17:14 UTC 2011 kill -USR1 26950 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26950 killed at Tue Nov 8 16:17:14 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:17:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27026 >/dev/null 2>/dev/null selfserv_9519 with PID 27026 found at Tue Nov 8 16:17:14 UTC 2011 selfserv_9519 with PID 27026 started at Tue Nov 8 16:17:14 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:14 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:17:14 UTC 2011 ssl.sh: #2907: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27026 at Tue Nov 8 16:17:14 UTC 2011 kill -USR1 27026 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27026 killed at Tue Nov 8 16:17:14 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:17:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27102 >/dev/null 2>/dev/null selfserv_9519 with PID 27102 found at Tue Nov 8 16:17:14 UTC 2011 selfserv_9519 with PID 27102 started at Tue Nov 8 16:17:14 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:14 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:17:14 UTC 2011 ssl.sh: #2908: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27102 at Tue Nov 8 16:17:14 UTC 2011 kill -USR1 27102 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27102 killed at Tue Nov 8 16:17:14 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27207 >/dev/null 2>/dev/null selfserv_9519 with PID 27207 found at Tue Nov 8 16:17:14 UTC 2011 selfserv_9519 with PID 27207 started at Tue Nov 8 16:17:14 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:14 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:17:15 UTC 2011 ssl.sh: #2909: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27207 at Tue Nov 8 16:17:15 UTC 2011 kill -USR1 27207 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27207 killed at Tue Nov 8 16:17:15 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27282 >/dev/null 2>/dev/null selfserv_9519 with PID 27282 found at Tue Nov 8 16:17:15 UTC 2011 selfserv_9519 with PID 27282 started at Tue Nov 8 16:17:15 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:15 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:17:15 UTC 2011 ssl.sh: #2910: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27282 at Tue Nov 8 16:17:15 UTC 2011 kill -USR1 27282 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27282 killed at Tue Nov 8 16:17:15 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27357 >/dev/null 2>/dev/null selfserv_9519 with PID 27357 found at Tue Nov 8 16:17:15 UTC 2011 selfserv_9519 with PID 27357 started at Tue Nov 8 16:17:15 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:15 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: #2911: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27357 at Tue Nov 8 16:17:16 UTC 2011 kill -USR1 27357 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27357 killed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27433 >/dev/null 2>/dev/null selfserv_9519 with PID 27433 found at Tue Nov 8 16:17:16 UTC 2011 selfserv_9519 with PID 27433 started at Tue Nov 8 16:17:16 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:16 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: #2912: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27433 at Tue Nov 8 16:17:16 UTC 2011 kill -USR1 27433 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27433 killed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:17:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27509 >/dev/null 2>/dev/null selfserv_9519 with PID 27509 found at Tue Nov 8 16:17:16 UTC 2011 selfserv_9519 with PID 27509 started at Tue Nov 8 16:17:16 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:16 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: #2913: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27509 at Tue Nov 8 16:17:16 UTC 2011 kill -USR1 27509 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27509 killed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:17:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27585 >/dev/null 2>/dev/null selfserv_9519 with PID 27585 found at Tue Nov 8 16:17:16 UTC 2011 selfserv_9519 with PID 27585 started at Tue Nov 8 16:17:16 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:16 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: #2914: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27585 at Tue Nov 8 16:17:16 UTC 2011 kill -USR1 27585 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27585 killed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:17:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:17:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27661 >/dev/null 2>/dev/null selfserv_9519 with PID 27661 found at Tue Nov 8 16:17:16 UTC 2011 selfserv_9519 with PID 27661 started at Tue Nov 8 16:17:16 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:17:16 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: #2915: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27661 at Tue Nov 8 16:17:16 UTC 2011 kill -USR1 27661 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27661 killed at Tue Nov 8 16:17:16 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) TIMESTAMP ssl END: Tue Nov 8 16:17:16 UTC 2011 Running tests for ocsp TIMESTAMP ocsp BEGIN: Tue Nov 8 16:17:16 UTC 2011 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Tue Nov 8 16:17:16 UTC 2011 Running tests for pkits TIMESTAMP pkits BEGIN: Tue Nov 8 16:17:16 UTC 2011 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Tue Nov 8 16:17:17 UTC 2011 Running tests for chains TIMESTAMP chains BEGIN: Tue Nov 8 16:17:17 UTC 2011 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2916: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161718 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2917: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2918: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2919: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161719 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2920: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2921: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2922: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2923: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1108161720 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2924: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #2925: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1108161721 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2926: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #2927: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2928: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2929: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #2930: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1108161722 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2931: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der chains.sh: #2932: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2933: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #2934: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #2935: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161719 (0x420d34b7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:17:17 2011 Not After : Tue Nov 08 16:17:17 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:b1:76:ef:df:45:20:60:31:7d:66:09:d3:e6:b1:45: 77:61:4c:a7:13:62:a1:5a:50:62:93:dc:2e:07:d5:9e: 82:50:73:c9:af:88:8e:24:33:5e:03:00:36:09:ae:bb: e0:23:eb:02:ca:1a:ba:61:59:15:7f:81:52:b7:db:72: cd:dc:64:59:37:65:c0:fd:66:e0:d1:84:9b:ea:4d:e7: 56:2e:10:31:f4:6b:8e:4e:ad:3b:8b:1b:6a:25:a5:79: e2:bb:7b:91:a9:2e:fc:21:f1:be:76:11:13:23:d8:e3: 6e:93:74:d1:2e:66:69:f0:37:21:8e:26:94:88:fd:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 57:04:e1:66:89:86:1a:e6:8f:61:31:48:54:af:37:f1: 53:85:3e:48:31:a2:61:92:9e:a0:08:ec:f2:51:e0:f2: 57:1d:60:50:a9:43:50:71:c6:24:2e:1e:7e:01:e0:11: 1b:0f:94:46:1c:a1:0f:bb:8a:44:de:b5:3b:8d:77:5d: ee:52:73:ba:ee:dd:35:f9:0a:03:4f:51:25:fa:5b:cc: 10:26:ec:25:e0:b2:11:1e:82:87:15:1b:54:cc:ca:b6: 1c:e9:9a:07:71:5e:9b:8c:94:e5:3c:4e:21:31:d2:4b: ad:40:a1:f2:36:91:66:5d:7b:b0:34:b6:0b:9e:a6:ab Fingerprint (MD5): 23:9B:00:51:71:71:DE:4C:AC:BE:78:DB:AD:2B:70:93 Fingerprint (SHA1): 35:17:3E:C1:57:73:89:2A:39:B3:01:6E:5F:D0:2C:BA:C7:3D:21:FA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2936: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161718 (0x420d34b6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:17:17 2011 Not After : Tue Nov 08 16:17:17 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:c5:d4:69:ae:1c:59:c8:e6:02:26:a0:67:a3:68:bd: 46:b1:cf:4b:1b:66:e9:9b:95:d5:29:23:a7:5b:39:3f: 60:d4:1d:f0:ba:f6:05:e3:81:1b:81:92:81:f3:23:f2: 4d:f8:9b:b2:64:c7:97:36:5f:10:dd:ec:8c:d2:b0:07: 21:19:a1:25:50:be:42:cf:68:12:26:93:e5:50:a2:cc: 08:d3:5c:a0:fb:89:49:f7:ec:7c:d1:1c:d0:72:3f:17: 1b:bf:7f:17:13:bd:48:8e:14:b4:19:df:95:73:a2:ea: fe:3b:f8:5e:d3:5a:34:9f:7c:a2:46:c7:17:64:2f:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 32:ea:fa:6a:a4:21:4c:97:97:ae:be:f0:ce:48:9d:46: 5d:ca:19:aa:3b:0c:bb:74:b6:aa:66:79:e7:47:5f:a0: 10:40:88:b8:28:c6:74:88:38:b1:71:55:45:0a:1a:a0: 8b:f9:2f:60:42:f6:64:50:a9:f4:90:21:dc:ce:f9:38: a7:41:08:72:47:45:2e:6e:85:b4:e5:22:35:2f:28:73: e7:4e:b2:e6:56:ce:a2:68:4d:91:5c:c0:81:d1:9e:29: d6:d1:f2:08:c8:df:8d:d2:ba:b4:a3:4c:6d:fd:46:95: fe:d9:2e:ad:99:b7:06:8d:ed:de:da:d0:ba:ce:07:11 Fingerprint (MD5): 44:51:0E:55:EB:10:77:75:69:73:52:74:55:93:BB:34 Fingerprint (SHA1): D4:18:24:30:BB:30:C6:E6:F7:6F:FE:F7:18:E6:F0:A2:E3:06:05:1F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2937: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2938: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #2939: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #2940: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161718 (0x420d34b6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:17:17 2011 Not After : Tue Nov 08 16:17:17 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:c5:d4:69:ae:1c:59:c8:e6:02:26:a0:67:a3:68:bd: 46:b1:cf:4b:1b:66:e9:9b:95:d5:29:23:a7:5b:39:3f: 60:d4:1d:f0:ba:f6:05:e3:81:1b:81:92:81:f3:23:f2: 4d:f8:9b:b2:64:c7:97:36:5f:10:dd:ec:8c:d2:b0:07: 21:19:a1:25:50:be:42:cf:68:12:26:93:e5:50:a2:cc: 08:d3:5c:a0:fb:89:49:f7:ec:7c:d1:1c:d0:72:3f:17: 1b:bf:7f:17:13:bd:48:8e:14:b4:19:df:95:73:a2:ea: fe:3b:f8:5e:d3:5a:34:9f:7c:a2:46:c7:17:64:2f:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 32:ea:fa:6a:a4:21:4c:97:97:ae:be:f0:ce:48:9d:46: 5d:ca:19:aa:3b:0c:bb:74:b6:aa:66:79:e7:47:5f:a0: 10:40:88:b8:28:c6:74:88:38:b1:71:55:45:0a:1a:a0: 8b:f9:2f:60:42:f6:64:50:a9:f4:90:21:dc:ce:f9:38: a7:41:08:72:47:45:2e:6e:85:b4:e5:22:35:2f:28:73: e7:4e:b2:e6:56:ce:a2:68:4d:91:5c:c0:81:d1:9e:29: d6:d1:f2:08:c8:df:8d:d2:ba:b4:a3:4c:6d:fd:46:95: fe:d9:2e:ad:99:b7:06:8d:ed:de:da:d0:ba:ce:07:11 Fingerprint (MD5): 44:51:0E:55:EB:10:77:75:69:73:52:74:55:93:BB:34 Fingerprint (SHA1): D4:18:24:30:BB:30:C6:E6:F7:6F:FE:F7:18:E6:F0:A2:E3:06:05:1F Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2941: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161719 (0x420d34b7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:17:17 2011 Not After : Tue Nov 08 16:17:17 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:b1:76:ef:df:45:20:60:31:7d:66:09:d3:e6:b1:45: 77:61:4c:a7:13:62:a1:5a:50:62:93:dc:2e:07:d5:9e: 82:50:73:c9:af:88:8e:24:33:5e:03:00:36:09:ae:bb: e0:23:eb:02:ca:1a:ba:61:59:15:7f:81:52:b7:db:72: cd:dc:64:59:37:65:c0:fd:66:e0:d1:84:9b:ea:4d:e7: 56:2e:10:31:f4:6b:8e:4e:ad:3b:8b:1b:6a:25:a5:79: e2:bb:7b:91:a9:2e:fc:21:f1:be:76:11:13:23:d8:e3: 6e:93:74:d1:2e:66:69:f0:37:21:8e:26:94:88:fd:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 57:04:e1:66:89:86:1a:e6:8f:61:31:48:54:af:37:f1: 53:85:3e:48:31:a2:61:92:9e:a0:08:ec:f2:51:e0:f2: 57:1d:60:50:a9:43:50:71:c6:24:2e:1e:7e:01:e0:11: 1b:0f:94:46:1c:a1:0f:bb:8a:44:de:b5:3b:8d:77:5d: ee:52:73:ba:ee:dd:35:f9:0a:03:4f:51:25:fa:5b:cc: 10:26:ec:25:e0:b2:11:1e:82:87:15:1b:54:cc:ca:b6: 1c:e9:9a:07:71:5e:9b:8c:94:e5:3c:4e:21:31:d2:4b: ad:40:a1:f2:36:91:66:5d:7b:b0:34:b6:0b:9e:a6:ab Fingerprint (MD5): 23:9B:00:51:71:71:DE:4C:AC:BE:78:DB:AD:2B:70:93 Fingerprint (SHA1): 35:17:3E:C1:57:73:89:2A:39:B3:01:6E:5F:D0:2C:BA:C7:3D:21:FA Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2942: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #2943: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #2944: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2945: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2946: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2947: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161719 (0x420d34b7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:17:17 2011 Not After : Tue Nov 08 16:17:17 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:b1:76:ef:df:45:20:60:31:7d:66:09:d3:e6:b1:45: 77:61:4c:a7:13:62:a1:5a:50:62:93:dc:2e:07:d5:9e: 82:50:73:c9:af:88:8e:24:33:5e:03:00:36:09:ae:bb: e0:23:eb:02:ca:1a:ba:61:59:15:7f:81:52:b7:db:72: cd:dc:64:59:37:65:c0:fd:66:e0:d1:84:9b:ea:4d:e7: 56:2e:10:31:f4:6b:8e:4e:ad:3b:8b:1b:6a:25:a5:79: e2:bb:7b:91:a9:2e:fc:21:f1:be:76:11:13:23:d8:e3: 6e:93:74:d1:2e:66:69:f0:37:21:8e:26:94:88:fd:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 57:04:e1:66:89:86:1a:e6:8f:61:31:48:54:af:37:f1: 53:85:3e:48:31:a2:61:92:9e:a0:08:ec:f2:51:e0:f2: 57:1d:60:50:a9:43:50:71:c6:24:2e:1e:7e:01:e0:11: 1b:0f:94:46:1c:a1:0f:bb:8a:44:de:b5:3b:8d:77:5d: ee:52:73:ba:ee:dd:35:f9:0a:03:4f:51:25:fa:5b:cc: 10:26:ec:25:e0:b2:11:1e:82:87:15:1b:54:cc:ca:b6: 1c:e9:9a:07:71:5e:9b:8c:94:e5:3c:4e:21:31:d2:4b: ad:40:a1:f2:36:91:66:5d:7b:b0:34:b6:0b:9e:a6:ab Fingerprint (MD5): 23:9B:00:51:71:71:DE:4C:AC:BE:78:DB:AD:2B:70:93 Fingerprint (SHA1): 35:17:3E:C1:57:73:89:2A:39:B3:01:6E:5F:D0:2C:BA:C7:3D:21:FA Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2948: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161719 (0x420d34b7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:17:17 2011 Not After : Tue Nov 08 16:17:17 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:b1:76:ef:df:45:20:60:31:7d:66:09:d3:e6:b1:45: 77:61:4c:a7:13:62:a1:5a:50:62:93:dc:2e:07:d5:9e: 82:50:73:c9:af:88:8e:24:33:5e:03:00:36:09:ae:bb: e0:23:eb:02:ca:1a:ba:61:59:15:7f:81:52:b7:db:72: cd:dc:64:59:37:65:c0:fd:66:e0:d1:84:9b:ea:4d:e7: 56:2e:10:31:f4:6b:8e:4e:ad:3b:8b:1b:6a:25:a5:79: e2:bb:7b:91:a9:2e:fc:21:f1:be:76:11:13:23:d8:e3: 6e:93:74:d1:2e:66:69:f0:37:21:8e:26:94:88:fd:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 57:04:e1:66:89:86:1a:e6:8f:61:31:48:54:af:37:f1: 53:85:3e:48:31:a2:61:92:9e:a0:08:ec:f2:51:e0:f2: 57:1d:60:50:a9:43:50:71:c6:24:2e:1e:7e:01:e0:11: 1b:0f:94:46:1c:a1:0f:bb:8a:44:de:b5:3b:8d:77:5d: ee:52:73:ba:ee:dd:35:f9:0a:03:4f:51:25:fa:5b:cc: 10:26:ec:25:e0:b2:11:1e:82:87:15:1b:54:cc:ca:b6: 1c:e9:9a:07:71:5e:9b:8c:94:e5:3c:4e:21:31:d2:4b: ad:40:a1:f2:36:91:66:5d:7b:b0:34:b6:0b:9e:a6:ab Fingerprint (MD5): 23:9B:00:51:71:71:DE:4C:AC:BE:78:DB:AD:2B:70:93 Fingerprint (SHA1): 35:17:3E:C1:57:73:89:2A:39:B3:01:6E:5F:D0:2C:BA:C7:3D:21:FA Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2949: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #2950: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #2951: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2952: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2953: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2954: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161718 (0x420d34b6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:17:17 2011 Not After : Tue Nov 08 16:17:17 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:c5:d4:69:ae:1c:59:c8:e6:02:26:a0:67:a3:68:bd: 46:b1:cf:4b:1b:66:e9:9b:95:d5:29:23:a7:5b:39:3f: 60:d4:1d:f0:ba:f6:05:e3:81:1b:81:92:81:f3:23:f2: 4d:f8:9b:b2:64:c7:97:36:5f:10:dd:ec:8c:d2:b0:07: 21:19:a1:25:50:be:42:cf:68:12:26:93:e5:50:a2:cc: 08:d3:5c:a0:fb:89:49:f7:ec:7c:d1:1c:d0:72:3f:17: 1b:bf:7f:17:13:bd:48:8e:14:b4:19:df:95:73:a2:ea: fe:3b:f8:5e:d3:5a:34:9f:7c:a2:46:c7:17:64:2f:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 32:ea:fa:6a:a4:21:4c:97:97:ae:be:f0:ce:48:9d:46: 5d:ca:19:aa:3b:0c:bb:74:b6:aa:66:79:e7:47:5f:a0: 10:40:88:b8:28:c6:74:88:38:b1:71:55:45:0a:1a:a0: 8b:f9:2f:60:42:f6:64:50:a9:f4:90:21:dc:ce:f9:38: a7:41:08:72:47:45:2e:6e:85:b4:e5:22:35:2f:28:73: e7:4e:b2:e6:56:ce:a2:68:4d:91:5c:c0:81:d1:9e:29: d6:d1:f2:08:c8:df:8d:d2:ba:b4:a3:4c:6d:fd:46:95: fe:d9:2e:ad:99:b7:06:8d:ed:de:da:d0:ba:ce:07:11 Fingerprint (MD5): 44:51:0E:55:EB:10:77:75:69:73:52:74:55:93:BB:34 Fingerprint (SHA1): D4:18:24:30:BB:30:C6:E6:F7:6F:FE:F7:18:E6:F0:A2:E3:06:05:1F Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2955: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161718 (0x420d34b6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:17:17 2011 Not After : Tue Nov 08 16:17:17 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:c5:d4:69:ae:1c:59:c8:e6:02:26:a0:67:a3:68:bd: 46:b1:cf:4b:1b:66:e9:9b:95:d5:29:23:a7:5b:39:3f: 60:d4:1d:f0:ba:f6:05:e3:81:1b:81:92:81:f3:23:f2: 4d:f8:9b:b2:64:c7:97:36:5f:10:dd:ec:8c:d2:b0:07: 21:19:a1:25:50:be:42:cf:68:12:26:93:e5:50:a2:cc: 08:d3:5c:a0:fb:89:49:f7:ec:7c:d1:1c:d0:72:3f:17: 1b:bf:7f:17:13:bd:48:8e:14:b4:19:df:95:73:a2:ea: fe:3b:f8:5e:d3:5a:34:9f:7c:a2:46:c7:17:64:2f:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 32:ea:fa:6a:a4:21:4c:97:97:ae:be:f0:ce:48:9d:46: 5d:ca:19:aa:3b:0c:bb:74:b6:aa:66:79:e7:47:5f:a0: 10:40:88:b8:28:c6:74:88:38:b1:71:55:45:0a:1a:a0: 8b:f9:2f:60:42:f6:64:50:a9:f4:90:21:dc:ce:f9:38: a7:41:08:72:47:45:2e:6e:85:b4:e5:22:35:2f:28:73: e7:4e:b2:e6:56:ce:a2:68:4d:91:5c:c0:81:d1:9e:29: d6:d1:f2:08:c8:df:8d:d2:ba:b4:a3:4c:6d:fd:46:95: fe:d9:2e:ad:99:b7:06:8d:ed:de:da:d0:ba:ce:07:11 Fingerprint (MD5): 44:51:0E:55:EB:10:77:75:69:73:52:74:55:93:BB:34 Fingerprint (SHA1): D4:18:24:30:BB:30:C6:E6:F7:6F:FE:F7:18:E6:F0:A2:E3:06:05:1F Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2956: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #2957: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161723 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2958: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #2959: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #2960: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161724 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2961: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #2962: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #2963: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161725 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2964: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #2965: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #2966: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161726 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2967: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #2968: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #2969: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161727 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2970: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #2971: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #2972: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161728 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2973: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #2974: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #2975: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161729 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2976: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #2977: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #2978: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161730 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2979: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #2980: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #2981: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161731 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #2982: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #2983: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #2984: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2985: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1108161732 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2986: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der chains.sh: #2987: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1108161733 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2988: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der chains.sh: #2989: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1108161734 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2990: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der chains.sh: #2991: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #2992: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #2993: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2994: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1108161735 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2995: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der chains.sh: #2996: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1108161736 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2997: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der chains.sh: #2998: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1108161737 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #2999: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der chains.sh: #3000: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #3001: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #3002: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3003: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1108161738 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3004: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der chains.sh: #3005: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1108161739 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3006: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der chains.sh: #3007: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1108161740 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3008: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der chains.sh: #3009: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #3010: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #3011: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3012: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1108161741 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3013: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der chains.sh: #3014: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1108161742 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3015: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der chains.sh: #3016: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1108161743 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3017: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der chains.sh: #3018: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #3019: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3020: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3021: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1108161744 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3022: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der chains.sh: #3023: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3024: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3025: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161745 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3026: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3027: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161723 (0x420d34bb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Tue Nov 08 16:17:19 2011 Not After : Tue Nov 08 16:17:19 2061 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:39:dd:59:3e:06:1b:f6:3f:37:85:8c:f4:17:37:e8: 55:f2:2d:27:45:87:7d:55:6a:05:38:88:91:fe:bd:9a: f3:fc:c9:00:be:fa:0f:83:dd:77:fd:7f:f9:c2:fe:f6: c0:65:e0:94:da:0e:aa:06:ca:3d:b9:91:dd:f0:a8:90: 1e:5f:8b:12:63:0a:b1:50:4f:aa:17:d1:97:bf:37:2d: 6b:df:9a:31:e2:39:ba:4b:11:a5:47:5e:d2:ed:95:7b: 44:d3:34:21:3a:c9:51:06:f6:3a:3a:59:cf:1a:6e:62: 92:b4:be:10:27:34:3c:99:1d:1a:ab:38:52:6b:cc:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0a:ee:a3:67:ef:bb:dc:3d:40:4c:93:38:9e:b7:cf:6e: 87:a9:51:6f:f0:30:d6:9c:c6:9c:81:14:0e:66:f5:6c: ab:7e:a9:60:f2:5d:67:15:a3:9a:2d:8d:34:cb:60:54: 1c:af:82:17:47:a1:22:fa:99:17:bf:b3:b8:11:7c:b6: 0f:ff:16:7e:85:a6:8d:ef:c5:80:92:5c:fe:ce:53:56: 49:da:55:bb:9f:ad:7d:c4:76:cf:71:2b:3a:5a:6b:00: 1e:fe:04:70:12:3a:a0:cd:2b:d6:fd:15:a3:64:a3:07: 99:16:6c:28:82:5f:75:f9:44:ff:06:f0:70:b5:b0:af Fingerprint (MD5): 0D:B5:CB:6F:C1:72:0B:A8:F7:EA:3C:CE:84:A9:F3:CC Fingerprint (SHA1): 09:C7:F9:A4:97:0E:AD:61:41:D8:7F:EC:C3:5F:A8:23:9A:0A:66:29 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3028: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161724 (0x420d34bc) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Tue Nov 08 16:17:20 2011 Not After : Tue Nov 08 16:17:20 2061 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:9e:c6:e9:c7:79:7d:39:9e:a3:9c:1e:9f:89:39:7f: 8e:0f:5a:76:58:24:25:5d:5b:4c:31:04:91:c6:80:86: 11:38:ce:23:e8:10:4c:de:dd:51:8c:20:9d:a9:7b:9d: b4:f8:49:c2:ed:98:b2:9f:eb:86:6f:3b:fc:c7:d8:79: 2c:c6:35:9c:a2:12:5b:b8:0b:c3:dd:43:12:b6:bc:49: 82:11:04:d9:87:79:b9:98:31:6f:d3:b1:bf:06:2f:95: 12:9c:80:40:79:dd:02:e2:77:40:3e:55:2b:36:de:b3: 28:72:fd:5f:4a:8a:9c:74:a2:ac:77:12:68:ba:82:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 75:d7:84:85:1b:de:08:c3:41:d2:bb:eb:20:b1:64:4d: 08:c4:83:79:5d:6d:54:73:6c:3a:ed:1e:fc:1c:79:1f: c7:b3:07:fe:e1:49:1c:7e:dc:b3:36:cd:9c:88:36:cc: 9e:a6:ae:cf:33:87:ed:43:52:a4:97:a3:e7:b5:ac:cf: e6:74:57:9d:77:e3:8b:3e:ef:ea:84:bb:ec:a8:8d:bd: b7:17:cb:e8:59:30:3f:78:93:ae:ff:f3:2e:3c:5a:d8: 90:f0:54:f7:45:7c:eb:24:a2:cf:5a:94:eb:3c:8d:28: f8:a2:d9:2c:7d:41:45:b9:d2:31:dd:0e:3e:37:f9:69 Fingerprint (MD5): 66:CC:04:CE:6F:E1:65:C1:12:B4:E9:B1:0A:C9:40:8D Fingerprint (SHA1): 6E:4B:3E:53:6E:D7:8E:70:ED:0C:5A:10:5D:E5:15:64:96:7D:7A:96 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3029: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161725 (0x420d34bd) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Tue Nov 08 16:17:20 2011 Not After : Tue Nov 08 16:17:20 2061 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:cb:23:3d:ab:b6:93:34:55:47:61:bc:a4:de:58:19: 2b:57:60:c3:ec:06:6a:ac:2a:0b:8f:8a:5b:d8:c1:4e: b5:c6:0d:e7:51:45:8d:7c:7a:38:a3:99:9d:35:f2:03: ff:66:1f:22:b8:f4:78:3e:5c:b4:a5:06:8d:29:6d:ed: 97:7b:21:79:62:96:fe:86:b6:12:f4:c5:9a:df:f4:3d: e6:e6:33:73:7b:9b:b8:4e:77:ff:f5:0a:13:45:38:37: 19:b0:a7:48:d5:81:9b:a8:7c:a6:df:7e:ed:d3:86:ba: 56:8b:bf:57:bd:69:0e:4b:45:dc:c1:97:8b:7b:29:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 58:24:cf:af:1c:a2:53:f4:39:2c:02:cf:61:e5:54:dc: 2f:83:2e:7f:14:ad:a5:1e:f2:51:bc:19:18:9d:59:d2: 3c:30:57:a1:a6:b1:7a:38:62:ff:16:42:1d:ee:d8:ee: 7c:8a:cd:0e:7b:6e:3d:fb:97:30:d4:48:f1:b5:e8:53: 1d:03:d0:92:8f:42:5c:e6:8c:a6:a4:a4:68:77:d1:b5: 22:4b:c9:0f:0d:4b:05:30:b2:c1:30:b0:a7:d7:b4:bc: 43:bd:57:28:14:ae:57:0d:83:b3:77:92:95:b0:fa:72: 3d:a5:6b:3d:39:45:c3:c1:29:be:c5:5d:b2:39:64:d7 Fingerprint (MD5): 51:BA:B2:74:67:43:47:59:A6:C5:47:28:3C:9D:E0:42 Fingerprint (SHA1): 6A:36:0E:FE:BD:74:94:01:A1:38:6E:06:22:0A:31:F6:C8:3C:E0:5B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #3030: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161726 (0x420d34be) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Tue Nov 08 16:17:20 2011 Not After : Tue Nov 08 16:17:20 2061 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:2d:10:16:ef:0b:1b:32:67:5a:a3:e0:e4:d9:a0:cf: e1:e5:11:78:d3:ff:59:ea:59:ae:8e:3e:f0:b7:a4:cf: a2:93:79:89:81:e8:ea:ea:43:7d:ca:05:18:57:7e:88: 4e:18:69:04:93:5c:a5:b1:0a:a7:e7:ba:a7:ee:ce:a6: 08:a5:ee:3b:31:96:86:08:0c:36:23:a9:e0:6a:45:e6: 59:01:0b:17:08:c9:eb:d0:bb:7c:51:7d:25:a6:47:f4: 2a:37:f5:62:a8:69:cb:d1:0f:12:ee:40:df:17:76:67: f2:85:56:30:cd:8f:6b:17:e5:d8:fd:06:a8:24:de:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4e:02:12:ea:d0:e9:d4:82:67:1d:0d:fb:e4:a0:f4:30: e9:20:5a:dc:bf:ba:99:e3:f1:77:10:83:af:ea:5f:25: 53:22:13:31:15:61:ae:1d:d5:83:b0:d8:e7:3b:51:88: 4e:e2:f9:70:eb:c0:26:31:9f:4a:5e:03:a2:c8:e8:ac: cd:9b:d9:f9:3b:17:47:32:2e:e5:6b:de:7b:bc:a7:26: c7:57:0b:45:22:9b:ba:83:cf:f5:b4:af:2e:0e:3f:33: 80:99:cc:9c:64:5c:8c:54:2a:46:6d:c4:31:f8:91:e9: 78:71:13:72:00:ee:3e:24:47:e5:9f:60:d0:65:a7:e4 Fingerprint (MD5): 38:2D:D6:69:C8:A4:D0:96:51:E6:A6:BF:77:4E:B4:10 Fingerprint (SHA1): A3:1E:5C:57:8A:19:18:CD:01:0D:94:4C:3D:DE:49:51:5B:2D:77:B2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3031: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161727 (0x420d34bf) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Tue Nov 08 16:17:21 2011 Not After : Tue Nov 08 16:17:21 2061 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:1d:ea:fa:73:c5:df:a0:35:92:b3:d2:de:86:19:c4: 07:61:9b:6b:a1:bc:e9:94:30:cc:62:78:80:03:c6:11: 6c:e0:d1:5f:e9:a5:a2:0d:25:32:32:18:eb:4f:aa:3b: a9:04:f2:28:3b:70:96:69:a7:18:0a:1f:da:91:84:50: 74:d2:9c:84:f8:87:db:6a:42:07:27:5a:02:94:a2:66: 92:43:df:f4:4f:1a:8c:8f:96:51:8f:8c:59:a7:de:b9: a2:5e:7c:d3:45:e3:07:3a:7a:1f:e7:38:25:e3:d3:10: 97:42:f1:ae:35:b0:c6:be:c1:e7:8d:ed:fd:b7:1e:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 19:4d:e8:b1:1c:d3:11:b7:a4:55:45:55:1b:d8:39:0f: 4c:ca:43:fd:1c:cb:cf:8c:2b:f6:76:93:4e:69:f4:8d: d4:f6:84:6d:53:10:b6:8a:39:bc:11:3a:6c:04:e1:90: 70:97:58:ce:35:ae:24:53:d3:1b:87:ec:f8:2e:73:c3: 0c:66:41:7a:7f:04:cf:e7:6e:8a:2d:bf:f4:70:eb:bf: 77:2b:f8:85:46:1d:6e:11:72:6a:cd:d3:e5:ef:84:e0: 69:4f:24:3c:97:32:6e:dd:95:44:24:85:c5:84:2c:b5: ce:3b:9d:e2:8b:4a:9d:d1:66:b3:33:50:64:1b:43:34 Fingerprint (MD5): 57:D1:D6:5C:D3:CF:18:83:3B:6A:B7:2C:44:37:50:95 Fingerprint (SHA1): 9C:D2:48:3A:36:0B:40:13:BD:54:BB:54:75:4C:4D:DD:15:EB:09:6C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3032: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161728 (0x420d34c0) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Tue Nov 08 16:17:21 2011 Not After : Tue Nov 08 16:17:21 2061 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:5a:b5:be:2e:83:87:ee:0e:fc:2a:60:97:35:09:1a: 6f:8f:ee:ce:90:6a:2b:b4:ce:83:19:5f:0b:ab:1c:cc: fb:4e:ca:f9:a8:d0:a4:7a:19:2f:e2:8f:43:4f:ff:3f: b5:a3:d2:7c:cc:f8:cd:30:81:0d:08:43:44:bd:7a:72: 9d:b8:af:5a:03:89:f1:54:0f:1e:0b:bf:ef:6d:e5:85: 5b:a7:1c:91:68:34:05:fd:30:f0:84:37:5b:82:45:d7: 11:21:a4:c6:0a:91:37:e6:59:64:1c:ad:02:c8:c3:f9: 0e:67:35:dd:f4:ff:69:1a:f8:42:23:1d:42:88:e3:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 84:be:74:f3:52:2a:2b:5e:90:8b:2b:af:95:af:9b:9c: 12:b5:ff:94:ce:77:ac:27:1d:20:a5:77:5c:f7:27:85: b2:d6:20:9a:2b:19:83:30:8d:f8:46:03:61:86:05:4b: 01:bf:14:36:cd:2b:ab:92:fc:0a:08:26:fe:6b:46:08: 20:46:b8:79:ca:a9:a0:94:15:ae:73:2f:a2:b6:88:66: 6b:03:23:9e:e0:39:dd:7c:59:ab:b4:14:a0:0e:b1:cd: 0f:c7:74:b3:0a:41:fc:a9:40:54:46:af:71:71:24:b0: 2c:ba:c7:4d:6a:f1:1e:b1:70:8e:c1:aa:e6:68:97:53 Fingerprint (MD5): 12:D2:F2:E7:FE:E5:2C:8B:72:D5:CC:3E:CF:F1:B6:7D Fingerprint (SHA1): 64:FA:85:70:B7:A7:BF:2B:16:96:0E:46:A8:F6:AD:B2:62:1A:DA:A3 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #3033: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161729 (0x420d34c1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Tue Nov 08 16:17:21 2011 Not After : Tue Nov 08 16:17:21 2061 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:64:8b:31:16:44:a3:a3:a6:a0:01:44:bc:f6:6f:b5: a4:99:ad:7e:e8:d2:f6:ca:04:cd:1f:5d:f6:1a:e1:d3: c1:38:03:29:e6:d2:6c:3b:34:13:8b:be:5b:8d:18:38: 8d:51:70:2f:a1:39:c8:06:2b:ba:d5:03:93:c1:4d:b9: 61:44:da:6a:b5:5b:7d:70:14:a5:10:3e:31:b5:58:60: f7:5a:15:f4:57:d2:75:88:50:ac:f8:a9:f0:a1:8e:d6: e4:cb:39:98:74:31:b4:20:33:6f:3c:27:1d:93:34:05: 83:c4:6a:78:8d:f2:f6:9b:22:c2:a0:4c:c6:ca:b1:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:43:b2:2f:be:04:27:7f:01:6e:03:c0:c1:61:33:9b: 01:d8:ae:05:99:f0:b3:e6:d9:b2:b7:17:9f:1f:f0:af: 09:94:00:a3:47:53:9d:91:44:a6:7c:ea:cd:34:5f:4d: 54:71:53:1b:5e:5b:26:22:26:63:f2:e7:1d:83:d4:5e: 95:54:2b:d2:d7:a1:bd:4b:5a:a8:24:45:4d:d0:c4:de: 04:a3:39:5d:19:a2:a0:64:30:65:63:8b:bb:01:9d:7a: 6e:da:3b:96:95:b8:97:69:03:06:78:41:a9:46:3a:af: ac:82:eb:d0:22:4d:52:49:73:6c:b4:d4:4d:02:cb:02 Fingerprint (MD5): E9:A4:B7:47:F6:38:78:6C:98:0F:28:E0:AC:ED:99:F2 Fingerprint (SHA1): 35:2B:C2:32:65:62:D4:AE:8A:B8:39:44:F1:49:A1:09:9B:32:D3:A2 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3034: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161730 (0x420d34c2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Tue Nov 08 16:17:21 2011 Not After : Tue Nov 08 16:17:21 2061 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:c4:1e:9f:be:da:57:9a:00:75:f4:4f:c0:b8:07:5a: a4:f3:2d:d0:68:d7:ed:2a:4b:33:af:ee:c7:35:2c:13: 95:9d:c8:ee:1b:a2:df:39:81:9f:5f:96:c4:82:68:f8: af:8b:56:00:6e:c7:de:f1:e5:88:be:5e:a7:d7:c1:89: f5:45:fe:ac:aa:c1:9e:d4:16:af:98:b9:42:0c:57:7b: 4d:18:d7:b8:d3:b3:25:d2:81:5b:48:b9:05:fd:65:68: 7f:6e:d2:a8:4d:42:00:3d:20:a6:74:3b:a8:62:fa:7d: ac:5c:9d:7d:cb:fc:4a:94:42:6c:41:8f:b0:55:15:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 48:04:a9:5c:e2:90:48:67:b1:5f:46:98:e2:c3:fd:09: 05:de:77:c7:07:b4:01:eb:53:8e:3b:eb:4f:6c:7e:c4: 0e:c7:6f:86:27:1f:fe:e0:aa:a5:57:74:72:12:86:2f: fd:e9:4c:fe:c6:13:93:14:0b:13:49:8b:c8:2e:76:bd: ca:26:2e:f9:89:9a:28:8b:61:bc:b7:d2:b0:47:90:e0: bc:16:2e:19:8d:a7:ca:52:c9:79:a8:12:65:37:34:26: 72:ee:a2:3e:94:ae:b9:3c:74:0a:c2:c0:57:30:c8:a7: ba:47:c2:4a:b8:87:f4:fb:85:c0:af:a8:44:cc:1d:53 Fingerprint (MD5): 6F:7E:68:39:7A:17:6B:BA:04:CF:F7:C8:74:F5:F9:A2 Fingerprint (SHA1): DD:FE:3C:F3:33:86:80:23:E8:71:5D:8F:7D:D4:31:6B:1B:07:6F:BE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3035: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161731 (0x420d34c3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Tue Nov 08 16:17:22 2011 Not After : Tue Nov 08 16:17:22 2061 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:24:3f:fb:9a:8f:2e:75:d8:d1:cf:f2:22:2c:12:ec: d9:fa:73:e1:a4:90:f0:d1:a1:39:7d:5f:4d:25:2b:f9: 56:58:17:8e:39:22:87:c1:b2:94:84:cd:03:b7:2b:d1: 60:82:dd:ec:83:b3:88:94:2f:3d:8c:ae:98:ce:6d:01: b3:9c:1b:8e:2d:4a:5f:eb:dd:aa:eb:04:e5:76:dd:93: a2:b6:2a:c8:08:95:01:7e:1f:9c:a9:60:a5:54:e0:ce: 4b:ca:25:96:a7:0a:63:f1:e0:2c:44:1f:27:3c:9f:a3: 9c:a6:ce:40:14:48:b3:4c:6b:1b:63:ce:bd:e4:de:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6a:b1:44:a2:e1:51:3c:3a:93:aa:2e:63:1d:f5:16:5c: d7:66:f4:2d:bf:0b:cb:d1:30:6f:69:87:b4:d7:cd:65: 40:04:58:b2:e8:c3:0e:6c:75:80:38:a9:29:cd:b3:c7: 48:f6:5d:bc:42:52:47:26:f8:20:1a:e8:41:8d:d7:1b: 71:56:4d:d3:c9:46:c0:bb:06:d8:0d:2a:a3:c7:e0:ca: 3e:22:1d:d1:ec:a5:19:7e:1f:8a:a6:61:22:74:89:91: da:d0:09:b6:22:35:c4:44:60:fe:4e:a4:a6:f9:b7:2c: 61:df:e7:ce:6f:56:cc:24:0c:1a:91:07:04:bc:38:fe Fingerprint (MD5): F2:2E:C5:34:66:88:A1:E9:82:D4:FF:66:7B:02:2B:F9 Fingerprint (SHA1): A5:42:81:84:97:4B:CF:DD:67:39:9A:C8:C6:0D:C4:AB:EB:34:87:47 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #3036: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3037: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161746 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3038: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3039: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3040: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3041: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161747 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3042: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3043: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3044: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3045: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161748 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3046: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3047: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3048: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3049: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1108161749 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3050: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #3051: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3052: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161746 (0x420d34d2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:25 2011 Not After : Tue Nov 08 16:17:25 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:45:f7:09:87:b6:5e:bf:5e:81:02:88:88:c9:f0:9f: 8b:f1:ea:db:d3:a6:5d:c2:d6:e4:1c:7d:21:b4:5e:a3: 7f:97:0c:69:77:f6:f5:ae:3d:bb:f0:3b:5f:ed:b0:41: db:a4:55:b7:1d:f7:95:36:43:0a:ce:bc:14:5f:c5:cd: 84:67:84:26:97:38:b6:f0:ad:1d:5a:66:a9:b6:6f:9d: 48:b4:7f:8b:17:57:dc:fa:65:4d:2b:93:cf:c5:2a:fd: 14:0e:c8:73:8a:a5:81:9e:9c:3e:3f:f0:bb:b6:06:ee: 8d:02:11:56:6b:38:63:a0:1f:4c:e9:65:4d:d7:a9:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5b:15:de:99:7d:d4:8e:55:f2:6b:fa:10:92:17:9b:9e: 55:5f:09:2a:69:f0:b7:ae:08:8f:0c:82:e0:71:2e:69: d7:cb:c0:20:4a:85:2f:48:40:e5:34:73:71:81:6e:68: 9e:33:17:0d:b9:b5:52:5b:ad:c8:ec:80:bb:23:57:8e: 72:2a:ba:8d:cd:96:1d:03:20:1f:e1:f4:b3:08:91:a6: 20:f2:4f:1c:80:7f:a5:61:c5:bb:c6:f4:e0:c8:ac:4f: 40:bd:53:b9:0a:7a:83:31:e9:a7:80:c4:ab:73:92:71: a2:d3:62:e9:e3:cb:4e:5e:28:0a:ae:a2:77:ac:94:8d Fingerprint (MD5): E7:7C:7D:CA:BA:49:A3:43:92:4D:D1:F8:35:65:D6:92 Fingerprint (SHA1): 1D:41:15:86:47:22:2C:75:AE:57:64:53:EB:F6:12:E9:E3:99:6A:DE Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3053: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3054: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161747 (0x420d34d3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:25 2011 Not After : Tue Nov 08 16:17:25 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:7b:4e:56:72:c0:0e:db:e3:0d:e8:f2:bd:59:16:21: 0e:3e:14:d1:92:6f:a3:2f:94:13:a5:70:91:46:fd:4b: 3c:7a:c7:60:c2:3c:7c:1e:3f:f7:d4:35:09:ef:1e:3f: 34:1c:28:10:ec:65:8b:f1:5b:83:75:f6:6d:3b:d3:0f: 07:55:b8:ac:cb:10:ed:2e:4b:2d:6d:67:05:93:dd:bf: 56:f0:bf:86:36:86:a1:34:fc:25:07:09:52:59:f7:73: 60:53:5e:f5:be:a7:e3:fe:f2:7d:fe:13:c3:2b:1e:a1: e0:80:88:68:5e:2d:63:83:da:ac:b2:6f:f0:d0:ab:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5e:96:4e:ae:7a:39:0b:2e:35:6d:a4:ff:57:15:95:d9: ac:67:de:2b:96:45:eb:3a:d6:34:c2:a4:c6:48:51:a6: ff:d2:64:52:cd:9e:7f:9d:9d:72:bd:dc:91:25:3f:3e: de:3e:7b:e1:5e:78:4f:29:e6:f8:0e:23:19:49:18:3e: ce:ef:40:4f:67:7c:8a:ef:9a:f0:9e:7d:d3:c4:43:15: 50:4e:26:f9:50:06:82:ce:19:c2:be:eb:42:a7:95:fe: 41:6e:6f:73:9d:85:c6:0d:33:65:d0:30:13:cd:65:97: f4:26:4f:ab:36:2b:f5:90:a8:66:a4:02:9d:b0:86:e4 Fingerprint (MD5): F7:1A:7E:09:FB:C1:A0:22:0A:A1:9B:50:F1:7B:40:B7 Fingerprint (SHA1): C1:E0:75:37:E3:17:E3:38:8D:EF:7F:45:EF:E0:60:28:A8:33:C3:31 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3055: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3056: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161748 (0x420d34d4) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:17:25 2011 Not After : Tue Nov 08 16:17:25 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:c7:dc:16:cd:55:4a:69:71:10:d8:25:1a:dd:08:0f: 42:d1:df:09:65:fb:ec:9a:a8:6e:d7:3a:4e:6d:02:cb: c2:1f:de:83:58:7a:8e:43:65:be:b8:a6:a5:50:6b:44: 63:c9:79:48:f2:c0:e9:7d:fe:b2:0a:3d:e3:1f:f4:fd: 5d:ca:26:fd:3f:1b:cb:55:a1:22:7a:7f:36:b9:5f:6a: da:fc:d6:07:2a:cc:4c:89:72:0f:04:09:86:8a:c1:4a: c1:e1:83:07:44:76:92:69:93:0a:3b:12:05:d3:c8:a6: 04:b8:50:b6:24:cf:e2:c4:04:43:9e:06:a1:3e:c6:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 37:bd:bd:90:3b:41:61:a7:92:9d:cf:d9:bc:4b:07:02: bb:c0:a3:c9:48:a8:cb:1f:6a:93:37:9e:99:2a:35:97: f8:26:e6:bd:02:67:33:ba:fa:81:1c:c0:f1:be:7a:40: a9:d0:6e:3e:73:3b:56:17:17:cb:fa:89:e6:07:4f:d8: 9a:54:23:9b:fe:00:a3:43:b1:db:d6:64:4f:c2:20:bf: f1:73:e1:f9:f5:28:0d:bf:01:a1:90:24:e9:71:d4:71: 05:ac:4f:21:59:22:ad:2f:2d:2b:8f:a9:1d:66:9c:08: 94:e2:92:02:64:0c:6f:d0:6d:71:6d:94:7f:1e:d7:21 Fingerprint (MD5): 7A:4E:DA:AF:99:2E:47:0E:02:77:54:2E:E5:46:2E:5F Fingerprint (SHA1): 75:EF:4E:22:68:A3:AB:D0:B1:F0:AF:E4:E1:98:36:5E:78:7B:BF:EE Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3057: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3058: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3059: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3060: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3061: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161746 (0x420d34d2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:25 2011 Not After : Tue Nov 08 16:17:25 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:45:f7:09:87:b6:5e:bf:5e:81:02:88:88:c9:f0:9f: 8b:f1:ea:db:d3:a6:5d:c2:d6:e4:1c:7d:21:b4:5e:a3: 7f:97:0c:69:77:f6:f5:ae:3d:bb:f0:3b:5f:ed:b0:41: db:a4:55:b7:1d:f7:95:36:43:0a:ce:bc:14:5f:c5:cd: 84:67:84:26:97:38:b6:f0:ad:1d:5a:66:a9:b6:6f:9d: 48:b4:7f:8b:17:57:dc:fa:65:4d:2b:93:cf:c5:2a:fd: 14:0e:c8:73:8a:a5:81:9e:9c:3e:3f:f0:bb:b6:06:ee: 8d:02:11:56:6b:38:63:a0:1f:4c:e9:65:4d:d7:a9:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5b:15:de:99:7d:d4:8e:55:f2:6b:fa:10:92:17:9b:9e: 55:5f:09:2a:69:f0:b7:ae:08:8f:0c:82:e0:71:2e:69: d7:cb:c0:20:4a:85:2f:48:40:e5:34:73:71:81:6e:68: 9e:33:17:0d:b9:b5:52:5b:ad:c8:ec:80:bb:23:57:8e: 72:2a:ba:8d:cd:96:1d:03:20:1f:e1:f4:b3:08:91:a6: 20:f2:4f:1c:80:7f:a5:61:c5:bb:c6:f4:e0:c8:ac:4f: 40:bd:53:b9:0a:7a:83:31:e9:a7:80:c4:ab:73:92:71: a2:d3:62:e9:e3:cb:4e:5e:28:0a:ae:a2:77:ac:94:8d Fingerprint (MD5): E7:7C:7D:CA:BA:49:A3:43:92:4D:D1:F8:35:65:D6:92 Fingerprint (SHA1): 1D:41:15:86:47:22:2C:75:AE:57:64:53:EB:F6:12:E9:E3:99:6A:DE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3062: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3063: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161747 (0x420d34d3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:25 2011 Not After : Tue Nov 08 16:17:25 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:7b:4e:56:72:c0:0e:db:e3:0d:e8:f2:bd:59:16:21: 0e:3e:14:d1:92:6f:a3:2f:94:13:a5:70:91:46:fd:4b: 3c:7a:c7:60:c2:3c:7c:1e:3f:f7:d4:35:09:ef:1e:3f: 34:1c:28:10:ec:65:8b:f1:5b:83:75:f6:6d:3b:d3:0f: 07:55:b8:ac:cb:10:ed:2e:4b:2d:6d:67:05:93:dd:bf: 56:f0:bf:86:36:86:a1:34:fc:25:07:09:52:59:f7:73: 60:53:5e:f5:be:a7:e3:fe:f2:7d:fe:13:c3:2b:1e:a1: e0:80:88:68:5e:2d:63:83:da:ac:b2:6f:f0:d0:ab:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5e:96:4e:ae:7a:39:0b:2e:35:6d:a4:ff:57:15:95:d9: ac:67:de:2b:96:45:eb:3a:d6:34:c2:a4:c6:48:51:a6: ff:d2:64:52:cd:9e:7f:9d:9d:72:bd:dc:91:25:3f:3e: de:3e:7b:e1:5e:78:4f:29:e6:f8:0e:23:19:49:18:3e: ce:ef:40:4f:67:7c:8a:ef:9a:f0:9e:7d:d3:c4:43:15: 50:4e:26:f9:50:06:82:ce:19:c2:be:eb:42:a7:95:fe: 41:6e:6f:73:9d:85:c6:0d:33:65:d0:30:13:cd:65:97: f4:26:4f:ab:36:2b:f5:90:a8:66:a4:02:9d:b0:86:e4 Fingerprint (MD5): F7:1A:7E:09:FB:C1:A0:22:0A:A1:9B:50:F1:7B:40:B7 Fingerprint (SHA1): C1:E0:75:37:E3:17:E3:38:8D:EF:7F:45:EF:E0:60:28:A8:33:C3:31 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3064: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3065: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161748 (0x420d34d4) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:17:25 2011 Not After : Tue Nov 08 16:17:25 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:c7:dc:16:cd:55:4a:69:71:10:d8:25:1a:dd:08:0f: 42:d1:df:09:65:fb:ec:9a:a8:6e:d7:3a:4e:6d:02:cb: c2:1f:de:83:58:7a:8e:43:65:be:b8:a6:a5:50:6b:44: 63:c9:79:48:f2:c0:e9:7d:fe:b2:0a:3d:e3:1f:f4:fd: 5d:ca:26:fd:3f:1b:cb:55:a1:22:7a:7f:36:b9:5f:6a: da:fc:d6:07:2a:cc:4c:89:72:0f:04:09:86:8a:c1:4a: c1:e1:83:07:44:76:92:69:93:0a:3b:12:05:d3:c8:a6: 04:b8:50:b6:24:cf:e2:c4:04:43:9e:06:a1:3e:c6:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 37:bd:bd:90:3b:41:61:a7:92:9d:cf:d9:bc:4b:07:02: bb:c0:a3:c9:48:a8:cb:1f:6a:93:37:9e:99:2a:35:97: f8:26:e6:bd:02:67:33:ba:fa:81:1c:c0:f1:be:7a:40: a9:d0:6e:3e:73:3b:56:17:17:cb:fa:89:e6:07:4f:d8: 9a:54:23:9b:fe:00:a3:43:b1:db:d6:64:4f:c2:20:bf: f1:73:e1:f9:f5:28:0d:bf:01:a1:90:24:e9:71:d4:71: 05:ac:4f:21:59:22:ad:2f:2d:2b:8f:a9:1d:66:9c:08: 94:e2:92:02:64:0c:6f:d0:6d:71:6d:94:7f:1e:d7:21 Fingerprint (MD5): 7A:4E:DA:AF:99:2E:47:0E:02:77:54:2E:E5:46:2E:5F Fingerprint (SHA1): 75:EF:4E:22:68:A3:AB:D0:B1:F0:AF:E4:E1:98:36:5E:78:7B:BF:EE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3066: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3067: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3068: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161750 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3069: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3070: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3071: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3072: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161751 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3073: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3074: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3075: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3076: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161752 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3077: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3078: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3079: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3080: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1108161753 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3081: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #3082: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3083: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3084: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1108161754 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3085: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #3086: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3087: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161750 (0x420d34d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:26 2011 Not After : Tue Nov 08 16:17:26 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:4a:a3:9c:70:40:75:0b:2f:91:14:ab:82:f0:46:9c: 6a:23:75:ed:7e:e5:57:cd:2b:07:c0:26:e6:4f:d1:00: cc:b5:27:8c:dc:21:6a:53:62:62:4e:52:f7:13:a2:30: 5b:f0:49:d3:84:16:ba:1e:5f:2a:b9:f9:57:0d:e9:8e: 3b:63:0e:44:a2:85:f5:75:ae:a6:6b:43:75:ba:b1:71: 19:52:aa:31:8d:88:67:5f:9b:40:4f:d4:ee:2d:db:a9: 56:b9:2a:0a:de:ec:af:7d:61:59:0f:47:b5:90:4f:e5: 35:f6:75:88:53:7e:93:fb:92:b1:84:58:ad:8f:7c:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:8f:69:f2:23:5f:cf:3e:e4:65:18:b2:21:36:65:bd: 7e:91:d4:5e:22:1f:f7:2a:be:7d:48:21:fa:b0:02:af: 7c:b2:89:56:52:8a:8a:f7:07:32:cc:d0:fb:34:c3:5a: 8f:a3:f9:96:93:f8:56:0e:ba:69:45:ae:8a:e7:76:0c: 2f:9b:9b:a5:cb:8e:32:be:58:e3:a5:0c:02:40:ec:80: 4a:0f:2f:30:07:3f:d3:39:06:cf:8f:56:74:05:3f:5f: a6:87:75:35:e9:89:78:7d:f8:08:8b:7d:f1:87:cb:43: 4c:f0:3d:e1:13:5e:4d:68:13:86:59:99:73:75:58:7b Fingerprint (MD5): 94:30:C2:4B:93:1B:3D:6A:34:98:E0:AA:1E:D2:07:F7 Fingerprint (SHA1): B7:8E:D3:EE:64:30:E2:77:8E:B9:05:38:66:AF:8A:5F:16:2D:7D:52 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3088: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3089: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161751 (0x420d34d7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:27 2011 Not After : Tue Nov 08 16:17:27 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:24:d8:b1:d9:90:af:37:d1:90:25:af:a2:76:ca:2b: 60:a7:00:f2:fb:fc:50:40:a7:f8:e3:b3:64:91:10:69: 84:d6:54:43:60:ee:d8:8c:d6:6a:00:df:92:e8:a7:31: 4f:f5:9c:da:69:c5:17:ea:57:86:db:73:9c:70:b7:58: 49:61:53:12:a3:68:f2:42:db:75:c1:ec:55:da:83:53: 5a:33:87:36:a1:9f:98:9e:c6:4e:8c:b2:12:27:6f:f7: 99:75:e0:be:6d:1a:4d:a8:a5:31:0f:10:ce:27:6b:f6: 72:aa:3b:06:0e:42:3c:06:b8:7a:6c:72:f5:9f:31:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3a:15:3f:6c:56:65:07:39:37:08:19:d7:73:35:c3:aa: a9:5c:11:d2:d8:f4:e7:1a:a8:35:46:dd:50:9f:0e:98: 42:9b:9b:84:e7:92:7e:78:51:3f:d5:e3:af:40:9e:94: 52:f2:3b:d2:32:87:69:e2:a5:66:0d:c9:ed:ea:c5:e8: 1e:1d:66:d3:b5:a0:a6:6c:de:c9:f4:ad:85:44:bf:33: 16:97:f5:d3:c0:48:05:23:d9:7d:6c:0d:68:dc:a0:bb: 91:e0:7b:69:c6:87:35:4a:e4:a9:f5:4e:99:a6:11:ee: 63:28:75:1b:16:37:95:c7:77:e6:88:f4:a7:f5:4c:88 Fingerprint (MD5): 64:78:A0:DB:3F:9E:8E:C5:F7:D9:67:B7:75:F5:EA:52 Fingerprint (SHA1): 70:65:30:B9:45:94:83:76:E5:8B:F4:52:CD:F4:32:07:76:20:7A:9A Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3090: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3091: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161752 (0x420d34d8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:17:27 2011 Not After : Tue Nov 08 16:17:27 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:fe:3b:ff:b0:41:d9:71:6c:8c:1b:7b:91:ff:2a:47: 92:1e:c9:c7:86:3f:2f:ae:37:cb:08:f4:49:69:a7:65: c4:1e:9c:a9:39:76:a6:f1:76:7b:d0:45:52:11:ab:c7: 6c:b1:43:f5:3c:cf:70:7c:02:a4:31:05:97:ee:c3:75: f1:f0:65:ce:77:5c:54:a7:a7:b9:b6:88:5c:72:e0:45: c9:98:9e:6b:c8:93:b9:9e:97:1d:75:13:e1:7f:45:e2: 0f:f1:76:06:b7:fc:b9:ec:c3:70:47:da:89:fc:89:db: f6:44:15:2a:77:3e:ec:7a:b9:d4:91:1b:fa:95:b8:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 14:45:64:12:05:e6:26:32:ee:13:6f:4e:05:e1:fb:5a: fd:79:d7:44:dd:92:72:89:1b:fe:fc:0b:8c:46:da:9c: 32:b2:ac:45:0f:5f:09:07:56:df:06:fc:17:2c:4f:11: e9:db:06:40:e1:fe:da:56:95:e6:dc:f9:58:b2:5a:98: 67:33:20:38:3b:83:c1:2f:94:7e:d0:ef:78:99:b0:5c: 40:a9:30:1f:3b:d3:26:6f:a9:b7:fc:6f:a8:37:8f:25: 44:28:8f:b8:22:06:43:1d:dd:87:ac:7c:a3:cd:31:27: b7:75:98:13:e5:f2:ce:48:64:e4:93:e7:4f:39:6f:34 Fingerprint (MD5): 49:7A:BC:7C:9A:AD:BB:5B:69:DE:BA:B1:F5:04:B0:31 Fingerprint (SHA1): 70:01:D4:FA:3A:9D:06:AC:F8:62:57:20:64:86:76:91:D8:10:A4:40 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3092: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3093: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3094: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3095: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3096: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161750 (0x420d34d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:26 2011 Not After : Tue Nov 08 16:17:26 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:4a:a3:9c:70:40:75:0b:2f:91:14:ab:82:f0:46:9c: 6a:23:75:ed:7e:e5:57:cd:2b:07:c0:26:e6:4f:d1:00: cc:b5:27:8c:dc:21:6a:53:62:62:4e:52:f7:13:a2:30: 5b:f0:49:d3:84:16:ba:1e:5f:2a:b9:f9:57:0d:e9:8e: 3b:63:0e:44:a2:85:f5:75:ae:a6:6b:43:75:ba:b1:71: 19:52:aa:31:8d:88:67:5f:9b:40:4f:d4:ee:2d:db:a9: 56:b9:2a:0a:de:ec:af:7d:61:59:0f:47:b5:90:4f:e5: 35:f6:75:88:53:7e:93:fb:92:b1:84:58:ad:8f:7c:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:8f:69:f2:23:5f:cf:3e:e4:65:18:b2:21:36:65:bd: 7e:91:d4:5e:22:1f:f7:2a:be:7d:48:21:fa:b0:02:af: 7c:b2:89:56:52:8a:8a:f7:07:32:cc:d0:fb:34:c3:5a: 8f:a3:f9:96:93:f8:56:0e:ba:69:45:ae:8a:e7:76:0c: 2f:9b:9b:a5:cb:8e:32:be:58:e3:a5:0c:02:40:ec:80: 4a:0f:2f:30:07:3f:d3:39:06:cf:8f:56:74:05:3f:5f: a6:87:75:35:e9:89:78:7d:f8:08:8b:7d:f1:87:cb:43: 4c:f0:3d:e1:13:5e:4d:68:13:86:59:99:73:75:58:7b Fingerprint (MD5): 94:30:C2:4B:93:1B:3D:6A:34:98:E0:AA:1E:D2:07:F7 Fingerprint (SHA1): B7:8E:D3:EE:64:30:E2:77:8E:B9:05:38:66:AF:8A:5F:16:2D:7D:52 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3097: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3098: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161751 (0x420d34d7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:27 2011 Not After : Tue Nov 08 16:17:27 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:24:d8:b1:d9:90:af:37:d1:90:25:af:a2:76:ca:2b: 60:a7:00:f2:fb:fc:50:40:a7:f8:e3:b3:64:91:10:69: 84:d6:54:43:60:ee:d8:8c:d6:6a:00:df:92:e8:a7:31: 4f:f5:9c:da:69:c5:17:ea:57:86:db:73:9c:70:b7:58: 49:61:53:12:a3:68:f2:42:db:75:c1:ec:55:da:83:53: 5a:33:87:36:a1:9f:98:9e:c6:4e:8c:b2:12:27:6f:f7: 99:75:e0:be:6d:1a:4d:a8:a5:31:0f:10:ce:27:6b:f6: 72:aa:3b:06:0e:42:3c:06:b8:7a:6c:72:f5:9f:31:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3a:15:3f:6c:56:65:07:39:37:08:19:d7:73:35:c3:aa: a9:5c:11:d2:d8:f4:e7:1a:a8:35:46:dd:50:9f:0e:98: 42:9b:9b:84:e7:92:7e:78:51:3f:d5:e3:af:40:9e:94: 52:f2:3b:d2:32:87:69:e2:a5:66:0d:c9:ed:ea:c5:e8: 1e:1d:66:d3:b5:a0:a6:6c:de:c9:f4:ad:85:44:bf:33: 16:97:f5:d3:c0:48:05:23:d9:7d:6c:0d:68:dc:a0:bb: 91:e0:7b:69:c6:87:35:4a:e4:a9:f5:4e:99:a6:11:ee: 63:28:75:1b:16:37:95:c7:77:e6:88:f4:a7:f5:4c:88 Fingerprint (MD5): 64:78:A0:DB:3F:9E:8E:C5:F7:D9:67:B7:75:F5:EA:52 Fingerprint (SHA1): 70:65:30:B9:45:94:83:76:E5:8B:F4:52:CD:F4:32:07:76:20:7A:9A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3099: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3100: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161752 (0x420d34d8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:17:27 2011 Not After : Tue Nov 08 16:17:27 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:fe:3b:ff:b0:41:d9:71:6c:8c:1b:7b:91:ff:2a:47: 92:1e:c9:c7:86:3f:2f:ae:37:cb:08:f4:49:69:a7:65: c4:1e:9c:a9:39:76:a6:f1:76:7b:d0:45:52:11:ab:c7: 6c:b1:43:f5:3c:cf:70:7c:02:a4:31:05:97:ee:c3:75: f1:f0:65:ce:77:5c:54:a7:a7:b9:b6:88:5c:72:e0:45: c9:98:9e:6b:c8:93:b9:9e:97:1d:75:13:e1:7f:45:e2: 0f:f1:76:06:b7:fc:b9:ec:c3:70:47:da:89:fc:89:db: f6:44:15:2a:77:3e:ec:7a:b9:d4:91:1b:fa:95:b8:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 14:45:64:12:05:e6:26:32:ee:13:6f:4e:05:e1:fb:5a: fd:79:d7:44:dd:92:72:89:1b:fe:fc:0b:8c:46:da:9c: 32:b2:ac:45:0f:5f:09:07:56:df:06:fc:17:2c:4f:11: e9:db:06:40:e1:fe:da:56:95:e6:dc:f9:58:b2:5a:98: 67:33:20:38:3b:83:c1:2f:94:7e:d0:ef:78:99:b0:5c: 40:a9:30:1f:3b:d3:26:6f:a9:b7:fc:6f:a8:37:8f:25: 44:28:8f:b8:22:06:43:1d:dd:87:ac:7c:a3:cd:31:27: b7:75:98:13:e5:f2:ce:48:64:e4:93:e7:4f:39:6f:34 Fingerprint (MD5): 49:7A:BC:7C:9A:AD:BB:5B:69:DE:BA:B1:F5:04:B0:31 Fingerprint (SHA1): 70:01:D4:FA:3A:9D:06:AC:F8:62:57:20:64:86:76:91:D8:10:A4:40 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #3101: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3102: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161750 (0x420d34d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:26 2011 Not After : Tue Nov 08 16:17:26 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:4a:a3:9c:70:40:75:0b:2f:91:14:ab:82:f0:46:9c: 6a:23:75:ed:7e:e5:57:cd:2b:07:c0:26:e6:4f:d1:00: cc:b5:27:8c:dc:21:6a:53:62:62:4e:52:f7:13:a2:30: 5b:f0:49:d3:84:16:ba:1e:5f:2a:b9:f9:57:0d:e9:8e: 3b:63:0e:44:a2:85:f5:75:ae:a6:6b:43:75:ba:b1:71: 19:52:aa:31:8d:88:67:5f:9b:40:4f:d4:ee:2d:db:a9: 56:b9:2a:0a:de:ec:af:7d:61:59:0f:47:b5:90:4f:e5: 35:f6:75:88:53:7e:93:fb:92:b1:84:58:ad:8f:7c:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:8f:69:f2:23:5f:cf:3e:e4:65:18:b2:21:36:65:bd: 7e:91:d4:5e:22:1f:f7:2a:be:7d:48:21:fa:b0:02:af: 7c:b2:89:56:52:8a:8a:f7:07:32:cc:d0:fb:34:c3:5a: 8f:a3:f9:96:93:f8:56:0e:ba:69:45:ae:8a:e7:76:0c: 2f:9b:9b:a5:cb:8e:32:be:58:e3:a5:0c:02:40:ec:80: 4a:0f:2f:30:07:3f:d3:39:06:cf:8f:56:74:05:3f:5f: a6:87:75:35:e9:89:78:7d:f8:08:8b:7d:f1:87:cb:43: 4c:f0:3d:e1:13:5e:4d:68:13:86:59:99:73:75:58:7b Fingerprint (MD5): 94:30:C2:4B:93:1B:3D:6A:34:98:E0:AA:1E:D2:07:F7 Fingerprint (SHA1): B7:8E:D3:EE:64:30:E2:77:8E:B9:05:38:66:AF:8A:5F:16:2D:7D:52 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3103: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161750 (0x420d34d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:26 2011 Not After : Tue Nov 08 16:17:26 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:4a:a3:9c:70:40:75:0b:2f:91:14:ab:82:f0:46:9c: 6a:23:75:ed:7e:e5:57:cd:2b:07:c0:26:e6:4f:d1:00: cc:b5:27:8c:dc:21:6a:53:62:62:4e:52:f7:13:a2:30: 5b:f0:49:d3:84:16:ba:1e:5f:2a:b9:f9:57:0d:e9:8e: 3b:63:0e:44:a2:85:f5:75:ae:a6:6b:43:75:ba:b1:71: 19:52:aa:31:8d:88:67:5f:9b:40:4f:d4:ee:2d:db:a9: 56:b9:2a:0a:de:ec:af:7d:61:59:0f:47:b5:90:4f:e5: 35:f6:75:88:53:7e:93:fb:92:b1:84:58:ad:8f:7c:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 8d:8f:69:f2:23:5f:cf:3e:e4:65:18:b2:21:36:65:bd: 7e:91:d4:5e:22:1f:f7:2a:be:7d:48:21:fa:b0:02:af: 7c:b2:89:56:52:8a:8a:f7:07:32:cc:d0:fb:34:c3:5a: 8f:a3:f9:96:93:f8:56:0e:ba:69:45:ae:8a:e7:76:0c: 2f:9b:9b:a5:cb:8e:32:be:58:e3:a5:0c:02:40:ec:80: 4a:0f:2f:30:07:3f:d3:39:06:cf:8f:56:74:05:3f:5f: a6:87:75:35:e9:89:78:7d:f8:08:8b:7d:f1:87:cb:43: 4c:f0:3d:e1:13:5e:4d:68:13:86:59:99:73:75:58:7b Fingerprint (MD5): 94:30:C2:4B:93:1B:3D:6A:34:98:E0:AA:1E:D2:07:F7 Fingerprint (SHA1): B7:8E:D3:EE:64:30:E2:77:8E:B9:05:38:66:AF:8A:5F:16:2D:7D:52 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3104: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161751 (0x420d34d7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:27 2011 Not After : Tue Nov 08 16:17:27 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:24:d8:b1:d9:90:af:37:d1:90:25:af:a2:76:ca:2b: 60:a7:00:f2:fb:fc:50:40:a7:f8:e3:b3:64:91:10:69: 84:d6:54:43:60:ee:d8:8c:d6:6a:00:df:92:e8:a7:31: 4f:f5:9c:da:69:c5:17:ea:57:86:db:73:9c:70:b7:58: 49:61:53:12:a3:68:f2:42:db:75:c1:ec:55:da:83:53: 5a:33:87:36:a1:9f:98:9e:c6:4e:8c:b2:12:27:6f:f7: 99:75:e0:be:6d:1a:4d:a8:a5:31:0f:10:ce:27:6b:f6: 72:aa:3b:06:0e:42:3c:06:b8:7a:6c:72:f5:9f:31:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3a:15:3f:6c:56:65:07:39:37:08:19:d7:73:35:c3:aa: a9:5c:11:d2:d8:f4:e7:1a:a8:35:46:dd:50:9f:0e:98: 42:9b:9b:84:e7:92:7e:78:51:3f:d5:e3:af:40:9e:94: 52:f2:3b:d2:32:87:69:e2:a5:66:0d:c9:ed:ea:c5:e8: 1e:1d:66:d3:b5:a0:a6:6c:de:c9:f4:ad:85:44:bf:33: 16:97:f5:d3:c0:48:05:23:d9:7d:6c:0d:68:dc:a0:bb: 91:e0:7b:69:c6:87:35:4a:e4:a9:f5:4e:99:a6:11:ee: 63:28:75:1b:16:37:95:c7:77:e6:88:f4:a7:f5:4c:88 Fingerprint (MD5): 64:78:A0:DB:3F:9E:8E:C5:F7:D9:67:B7:75:F5:EA:52 Fingerprint (SHA1): 70:65:30:B9:45:94:83:76:E5:8B:F4:52:CD:F4:32:07:76:20:7A:9A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3105: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161751 (0x420d34d7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:27 2011 Not After : Tue Nov 08 16:17:27 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:24:d8:b1:d9:90:af:37:d1:90:25:af:a2:76:ca:2b: 60:a7:00:f2:fb:fc:50:40:a7:f8:e3:b3:64:91:10:69: 84:d6:54:43:60:ee:d8:8c:d6:6a:00:df:92:e8:a7:31: 4f:f5:9c:da:69:c5:17:ea:57:86:db:73:9c:70:b7:58: 49:61:53:12:a3:68:f2:42:db:75:c1:ec:55:da:83:53: 5a:33:87:36:a1:9f:98:9e:c6:4e:8c:b2:12:27:6f:f7: 99:75:e0:be:6d:1a:4d:a8:a5:31:0f:10:ce:27:6b:f6: 72:aa:3b:06:0e:42:3c:06:b8:7a:6c:72:f5:9f:31:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3a:15:3f:6c:56:65:07:39:37:08:19:d7:73:35:c3:aa: a9:5c:11:d2:d8:f4:e7:1a:a8:35:46:dd:50:9f:0e:98: 42:9b:9b:84:e7:92:7e:78:51:3f:d5:e3:af:40:9e:94: 52:f2:3b:d2:32:87:69:e2:a5:66:0d:c9:ed:ea:c5:e8: 1e:1d:66:d3:b5:a0:a6:6c:de:c9:f4:ad:85:44:bf:33: 16:97:f5:d3:c0:48:05:23:d9:7d:6c:0d:68:dc:a0:bb: 91:e0:7b:69:c6:87:35:4a:e4:a9:f5:4e:99:a6:11:ee: 63:28:75:1b:16:37:95:c7:77:e6:88:f4:a7:f5:4c:88 Fingerprint (MD5): 64:78:A0:DB:3F:9E:8E:C5:F7:D9:67:B7:75:F5:EA:52 Fingerprint (SHA1): 70:65:30:B9:45:94:83:76:E5:8B:F4:52:CD:F4:32:07:76:20:7A:9A Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3106: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161752 (0x420d34d8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:17:27 2011 Not After : Tue Nov 08 16:17:27 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:fe:3b:ff:b0:41:d9:71:6c:8c:1b:7b:91:ff:2a:47: 92:1e:c9:c7:86:3f:2f:ae:37:cb:08:f4:49:69:a7:65: c4:1e:9c:a9:39:76:a6:f1:76:7b:d0:45:52:11:ab:c7: 6c:b1:43:f5:3c:cf:70:7c:02:a4:31:05:97:ee:c3:75: f1:f0:65:ce:77:5c:54:a7:a7:b9:b6:88:5c:72:e0:45: c9:98:9e:6b:c8:93:b9:9e:97:1d:75:13:e1:7f:45:e2: 0f:f1:76:06:b7:fc:b9:ec:c3:70:47:da:89:fc:89:db: f6:44:15:2a:77:3e:ec:7a:b9:d4:91:1b:fa:95:b8:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 14:45:64:12:05:e6:26:32:ee:13:6f:4e:05:e1:fb:5a: fd:79:d7:44:dd:92:72:89:1b:fe:fc:0b:8c:46:da:9c: 32:b2:ac:45:0f:5f:09:07:56:df:06:fc:17:2c:4f:11: e9:db:06:40:e1:fe:da:56:95:e6:dc:f9:58:b2:5a:98: 67:33:20:38:3b:83:c1:2f:94:7e:d0:ef:78:99:b0:5c: 40:a9:30:1f:3b:d3:26:6f:a9:b7:fc:6f:a8:37:8f:25: 44:28:8f:b8:22:06:43:1d:dd:87:ac:7c:a3:cd:31:27: b7:75:98:13:e5:f2:ce:48:64:e4:93:e7:4f:39:6f:34 Fingerprint (MD5): 49:7A:BC:7C:9A:AD:BB:5B:69:DE:BA:B1:F5:04:B0:31 Fingerprint (SHA1): 70:01:D4:FA:3A:9D:06:AC:F8:62:57:20:64:86:76:91:D8:10:A4:40 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3107: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161752 (0x420d34d8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:17:27 2011 Not After : Tue Nov 08 16:17:27 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:fe:3b:ff:b0:41:d9:71:6c:8c:1b:7b:91:ff:2a:47: 92:1e:c9:c7:86:3f:2f:ae:37:cb:08:f4:49:69:a7:65: c4:1e:9c:a9:39:76:a6:f1:76:7b:d0:45:52:11:ab:c7: 6c:b1:43:f5:3c:cf:70:7c:02:a4:31:05:97:ee:c3:75: f1:f0:65:ce:77:5c:54:a7:a7:b9:b6:88:5c:72:e0:45: c9:98:9e:6b:c8:93:b9:9e:97:1d:75:13:e1:7f:45:e2: 0f:f1:76:06:b7:fc:b9:ec:c3:70:47:da:89:fc:89:db: f6:44:15:2a:77:3e:ec:7a:b9:d4:91:1b:fa:95:b8:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 14:45:64:12:05:e6:26:32:ee:13:6f:4e:05:e1:fb:5a: fd:79:d7:44:dd:92:72:89:1b:fe:fc:0b:8c:46:da:9c: 32:b2:ac:45:0f:5f:09:07:56:df:06:fc:17:2c:4f:11: e9:db:06:40:e1:fe:da:56:95:e6:dc:f9:58:b2:5a:98: 67:33:20:38:3b:83:c1:2f:94:7e:d0:ef:78:99:b0:5c: 40:a9:30:1f:3b:d3:26:6f:a9:b7:fc:6f:a8:37:8f:25: 44:28:8f:b8:22:06:43:1d:dd:87:ac:7c:a3:cd:31:27: b7:75:98:13:e5:f2:ce:48:64:e4:93:e7:4f:39:6f:34 Fingerprint (MD5): 49:7A:BC:7C:9A:AD:BB:5B:69:DE:BA:B1:F5:04:B0:31 Fingerprint (SHA1): 70:01:D4:FA:3A:9D:06:AC:F8:62:57:20:64:86:76:91:D8:10:A4:40 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #3108: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3109: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161755 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3110: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3111: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3112: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3113: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1108161756 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3114: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #3115: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3116: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3117: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161757 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3118: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3119: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3120: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3121: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1108161758 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3122: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der chains.sh: #3123: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #3124: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3125: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1108161759 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3126: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #3127: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #3128: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3129: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1108161760 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3130: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #3131: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #3132: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3133: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1108161761 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3134: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der chains.sh: #3135: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3136: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #3137: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #3138: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3139: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #3140: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161755 (0x420d34db) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:29 2011 Not After : Tue Nov 08 16:17:29 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:57:4e:71:92:c8:56:05:3b:9d:08:0d:40:06:a4:79: 99:6c:51:d4:93:63:76:23:eb:29:1d:25:e0:a7:99:57: 72:1d:95:8e:da:e2:dd:7a:b1:86:58:ad:14:54:60:7b: 5f:17:52:a2:09:67:ef:2b:04:37:ab:f4:bc:87:75:ea: cf:1c:cf:90:2c:f5:22:c9:0b:1e:38:a0:ae:03:7b:06: 06:25:e5:8d:17:b8:d9:1f:b0:a7:f1:8a:b4:c8:4c:67: c2:a9:7a:ef:65:f2:27:91:b0:fe:98:94:95:89:39:e3: f7:d3:d8:ba:e7:46:8c:75:8d:7f:fa:aa:af:d2:98:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5e:1a:73:1a:48:a3:56:67:97:32:94:3c:36:0f:8b:4b: 9c:eb:3d:65:5e:4e:83:b1:4d:bc:53:03:8e:95:d2:47: 5e:6e:12:d3:06:2b:6e:56:08:cc:07:31:0f:c3:29:03: fd:db:39:09:70:95:1b:f3:98:0c:a9:80:83:6f:29:2d: 62:39:c8:3d:ba:5d:a5:e0:3a:35:6a:06:7e:b0:72:35: d7:bd:ed:e3:89:8c:fe:6f:a6:7a:2f:e4:c7:f7:ed:b1: 89:2c:1b:0c:c4:3f:e2:c9:70:58:ff:44:a1:02:cc:4a: 48:79:4c:05:00:c7:81:7a:d0:c1:1b:1e:3c:97:7d:15 Fingerprint (MD5): 82:7B:5B:55:07:41:12:9B:6F:FC:AF:43:3E:CD:85:8B Fingerprint (SHA1): 85:EF:7E:3E:37:06:46:05:5E:BB:BF:F8:3F:0D:0B:D5:0F:9E:02:44 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3141: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3142: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3143: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3144: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161755 (0x420d34db) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:29 2011 Not After : Tue Nov 08 16:17:29 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:57:4e:71:92:c8:56:05:3b:9d:08:0d:40:06:a4:79: 99:6c:51:d4:93:63:76:23:eb:29:1d:25:e0:a7:99:57: 72:1d:95:8e:da:e2:dd:7a:b1:86:58:ad:14:54:60:7b: 5f:17:52:a2:09:67:ef:2b:04:37:ab:f4:bc:87:75:ea: cf:1c:cf:90:2c:f5:22:c9:0b:1e:38:a0:ae:03:7b:06: 06:25:e5:8d:17:b8:d9:1f:b0:a7:f1:8a:b4:c8:4c:67: c2:a9:7a:ef:65:f2:27:91:b0:fe:98:94:95:89:39:e3: f7:d3:d8:ba:e7:46:8c:75:8d:7f:fa:aa:af:d2:98:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 5e:1a:73:1a:48:a3:56:67:97:32:94:3c:36:0f:8b:4b: 9c:eb:3d:65:5e:4e:83:b1:4d:bc:53:03:8e:95:d2:47: 5e:6e:12:d3:06:2b:6e:56:08:cc:07:31:0f:c3:29:03: fd:db:39:09:70:95:1b:f3:98:0c:a9:80:83:6f:29:2d: 62:39:c8:3d:ba:5d:a5:e0:3a:35:6a:06:7e:b0:72:35: d7:bd:ed:e3:89:8c:fe:6f:a6:7a:2f:e4:c7:f7:ed:b1: 89:2c:1b:0c:c4:3f:e2:c9:70:58:ff:44:a1:02:cc:4a: 48:79:4c:05:00:c7:81:7a:d0:c1:1b:1e:3c:97:7d:15 Fingerprint (MD5): 82:7B:5B:55:07:41:12:9B:6F:FC:AF:43:3E:CD:85:8B Fingerprint (SHA1): 85:EF:7E:3E:37:06:46:05:5E:BB:BF:F8:3F:0D:0B:D5:0F:9E:02:44 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3145: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3146: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3147: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161762 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3148: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3149: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3150: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3151: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1108161763 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3152: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #3153: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #3154: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3155: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1108161764 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3156: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der chains.sh: #3157: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #3158: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3159: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1108161765 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3160: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der chains.sh: #3161: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3162: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3163: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1108161766 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3164: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der chains.sh: #3165: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #3166: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3167: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1108161767 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3168: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der chains.sh: #3169: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #3170: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3171: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1108161768 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3172: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der chains.sh: #3173: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3174: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3175: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1108161769 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3176: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der chains.sh: #3177: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #3178: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3179: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1108161770 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3180: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der chains.sh: #3181: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #3182: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3183: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1108161771 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3184: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der chains.sh: #3185: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3186: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3187: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1108161772 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3188: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der chains.sh: #3189: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #3190: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3191: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1108161773 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3192: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der chains.sh: #3193: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #3194: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3195: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1108161774 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3196: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der chains.sh: #3197: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3198: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3199: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1108161775 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3200: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der chains.sh: #3201: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #3202: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3203: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1108161776 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3204: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der chains.sh: #3205: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #3206: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3207: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1108161777 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3208: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der chains.sh: #3209: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #3210: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3211: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1108161778 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3212: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der chains.sh: #3213: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #3214: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3215: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1108161779 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3216: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der chains.sh: #3217: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #3218: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3219: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1108161780 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3220: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der chains.sh: #3221: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #3222: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3223: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1108161781 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3224: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der chains.sh: #3225: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #3226: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3227: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1108161782 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3228: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der chains.sh: #3229: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #3230: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3231: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1108161783 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3232: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der chains.sh: #3233: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #3234: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3235: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1108161784 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3236: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der chains.sh: #3237: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #3238: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3239: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1108161785 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3240: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der chains.sh: #3241: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #3242: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3243: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1108161786 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3244: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der chains.sh: #3245: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #3246: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3247: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1108161787 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3248: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der chains.sh: #3249: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #3250: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3251: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1108161788 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3252: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der chains.sh: #3253: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3254: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3255: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1108161789 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3256: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der chains.sh: #3257: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3258: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3259: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1108161790 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3260: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der chains.sh: #3261: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3262: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3263: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1108161791 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3264: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der chains.sh: #3265: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3266: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3267: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3268: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3269: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3270: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3271: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3272: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3273: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3274: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3275: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3276: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3277: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3278: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3279: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3280: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3281: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3282: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3283: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3284: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3285: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3286: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3287: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3288: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161762 (0x420d34e2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:17:32 2011 Not After : Tue Nov 08 16:17:32 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:e9:79:8b:0c:05:f5:d3:8e:b8:0b:47:62:74:f4:a5: 7f:6c:06:37:89:71:a4:28:3d:5d:55:17:9b:47:9c:17: 81:6c:ce:8c:5e:5a:d3:31:95:96:1f:4b:c0:d6:7f:65: 88:cb:39:dc:3c:b6:83:7a:df:d4:d2:d0:01:71:7f:c8: 73:6a:9a:21:bd:d3:54:04:a6:d7:02:80:1c:18:b0:81: dc:fc:f8:17:c6:3d:42:99:18:4f:db:7a:d3:0a:bb:2f: 57:ce:be:ea:b7:91:94:35:c4:68:cf:dc:0a:6b:a4:1c: a6:f8:d9:bd:62:c1:3c:e4:77:5f:08:cc:e2:2f:ea:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a0:ea:04:65:b7:d5:d8:bb:83:b4:e3:69:fc:54:40:09: 8b:2e:86:c6:4b:c2:9f:5c:86:47:b5:51:8e:4d:2a:5c: 03:22:04:c6:9e:51:4a:ec:0d:9b:fa:ee:32:42:71:f6: 03:55:be:a6:1d:69:61:36:6c:9b:ca:f7:f4:52:f2:95: e4:63:24:19:6d:85:59:19:d5:e2:09:d5:cf:5d:0d:14: c7:ab:f7:50:9c:bf:22:55:6b:8f:ac:54:f3:db:b3:24: 03:a6:60:8f:6e:10:ca:a2:63:3a:45:a6:30:0e:f0:9f: ee:cb:60:6b:6d:33:9a:e4:1d:82:08:45:1c:f2:68:f1 Fingerprint (MD5): 51:08:4C:D9:4D:A4:B0:B8:FF:9B:0B:A5:10:3A:48:A9 Fingerprint (SHA1): 68:A1:F9:E7:2E:23:86:AB:48:22:8F:4D:DB:53:C9:E9:8B:43:A0:45 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3289: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3290: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3291: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161792 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3292: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3293: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3294: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3295: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1108161793 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3296: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der chains.sh: #3297: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3298: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3299: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1108161794 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3300: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der chains.sh: #3301: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3302: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3303: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1108161795 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3304: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der chains.sh: #3305: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3306: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3307: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1108161796 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3308: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der chains.sh: #3309: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3310: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3311: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1108161797 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3312: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der chains.sh: #3313: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3314: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3315: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1108161798 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3316: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der chains.sh: #3317: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3318: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161792 (0x420d3500) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:42 2011 Not After : Tue Nov 08 16:17:42 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:6e:bf:3f:f9:75:50:3d:51:69:7f:f0:a7:7c:b4:4c: 97:68:47:7c:a4:f9:ec:69:07:10:54:14:63:10:84:a9: f2:71:1b:54:00:06:2f:7d:5d:9d:12:fd:77:44:7c:ce: e7:81:38:52:f6:59:05:39:c2:02:93:4d:2a:3f:a6:6d: af:8c:20:cc:7c:08:d2:8a:ef:8d:88:d6:83:43:39:21: dc:b0:ac:5b:84:63:05:b2:92:7c:70:ae:9d:ec:a5:d4: 0f:71:57:52:42:10:44:03:cb:15:a5:7a:15:f3:78:ed: 59:e5:72:11:50:79:25:91:ed:ba:59:d0:4a:62:81:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:e2:57:e1:38:4f:28:ad:7e:16:cf:aa:66:0f:80:7f: 6d:0b:62:bd:bf:20:83:54:76:27:ac:f1:95:8e:96:96: 6e:7a:d7:3d:7b:56:71:d4:6a:68:49:9b:05:51:87:f6: eb:3a:5e:c8:70:83:89:d8:b9:2d:98:b5:2e:ee:7b:e7: 62:da:6e:21:50:f7:c1:b3:9d:04:05:f9:fc:ab:af:92: f6:28:81:70:83:a4:b3:c3:26:d9:7f:47:ec:47:94:ad: 55:86:b9:40:44:82:ca:5e:d0:d0:6d:d5:9f:19:1c:cb: 51:18:41:ea:86:16:9e:b9:34:5e:3e:e9:53:8c:22:71 Fingerprint (MD5): 8E:FC:AE:FD:67:86:97:8B:39:05:68:4E:87:86:A6:1A Fingerprint (SHA1): 54:CB:F5:17:D2:05:89:C5:0C:4A:AE:A7:E3:A7:BB:29:80:A4:0F:E0 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3319: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3320: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3321: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3322: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161792 (0x420d3500) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:42 2011 Not After : Tue Nov 08 16:17:42 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:6e:bf:3f:f9:75:50:3d:51:69:7f:f0:a7:7c:b4:4c: 97:68:47:7c:a4:f9:ec:69:07:10:54:14:63:10:84:a9: f2:71:1b:54:00:06:2f:7d:5d:9d:12:fd:77:44:7c:ce: e7:81:38:52:f6:59:05:39:c2:02:93:4d:2a:3f:a6:6d: af:8c:20:cc:7c:08:d2:8a:ef:8d:88:d6:83:43:39:21: dc:b0:ac:5b:84:63:05:b2:92:7c:70:ae:9d:ec:a5:d4: 0f:71:57:52:42:10:44:03:cb:15:a5:7a:15:f3:78:ed: 59:e5:72:11:50:79:25:91:ed:ba:59:d0:4a:62:81:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:e2:57:e1:38:4f:28:ad:7e:16:cf:aa:66:0f:80:7f: 6d:0b:62:bd:bf:20:83:54:76:27:ac:f1:95:8e:96:96: 6e:7a:d7:3d:7b:56:71:d4:6a:68:49:9b:05:51:87:f6: eb:3a:5e:c8:70:83:89:d8:b9:2d:98:b5:2e:ee:7b:e7: 62:da:6e:21:50:f7:c1:b3:9d:04:05:f9:fc:ab:af:92: f6:28:81:70:83:a4:b3:c3:26:d9:7f:47:ec:47:94:ad: 55:86:b9:40:44:82:ca:5e:d0:d0:6d:d5:9f:19:1c:cb: 51:18:41:ea:86:16:9e:b9:34:5e:3e:e9:53:8c:22:71 Fingerprint (MD5): 8E:FC:AE:FD:67:86:97:8B:39:05:68:4E:87:86:A6:1A Fingerprint (SHA1): 54:CB:F5:17:D2:05:89:C5:0C:4A:AE:A7:E3:A7:BB:29:80:A4:0F:E0 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3323: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3324: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3325: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3326: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161799 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3327: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3328: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3329: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3330: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161800 --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3331: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3332: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3333: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3334: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161801 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3335: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3336: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3337: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3338: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1108161802 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3339: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #3340: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3341: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3342: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3343: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3344: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161799 (0x420d3507) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:45 2011 Not After : Tue Nov 08 16:17:45 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:e1:e3:d4:28:f6:51:85:79:ca:78:5f:37:d2:50:0e: 0b:34:35:eb:12:be:f8:ba:4a:83:db:e4:20:8d:3b:bc: 55:52:7e:0e:e4:05:12:34:bb:95:76:95:45:6a:34:0b: 40:bd:42:e3:85:ae:d8:18:b4:7b:f7:46:fa:a8:cc:2c: 4d:f6:4b:71:20:e0:01:e2:16:0c:43:f8:29:6a:0b:86: e3:3d:68:79:65:ef:cd:8b:a4:5a:03:67:42:5b:76:68: e7:86:6d:50:05:10:06:72:af:97:6e:d5:e0:50:f3:77: fa:47:3e:0d:d9:1c:b6:0f:b3:70:9d:f1:1f:d1:c3:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: aa:c8:4e:bf:61:5b:ea:1d:35:bf:e1:7d:ff:1e:86:ea: b3:4f:3b:d8:b5:16:7c:1b:6c:94:58:d7:2e:0a:44:c8: 5e:52:91:14:15:c1:b5:da:0b:2a:16:f8:73:ea:c1:8f: 8f:5f:68:89:c3:38:64:fb:0c:2e:a3:3a:8a:07:a0:cf: 87:a8:cd:f5:bd:8d:47:7d:40:04:a5:cf:a0:9d:7b:12: 2d:e6:ed:79:5c:58:1a:45:f5:97:41:a3:23:a2:58:d9: 87:83:85:4e:56:a4:41:62:a4:52:c5:34:a0:53:f4:12: a0:29:ad:d2:2a:33:4e:c8:e1:12:26:e2:85:29:5e:ce Fingerprint (MD5): 1A:58:A6:19:93:03:93:89:A2:64:AA:8B:1D:37:A3:AE Fingerprint (SHA1): 68:3A:18:C6:28:C0:6F:B0:E5:19:3A:70:78:90:8E:AC:BF:62:52:BF Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3345: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3346: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3347: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161800 (0x420d3508) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:46 2011 Not After : Tue Nov 08 16:17:46 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:31:80:cf:7d:5d:85:47:69:7b:8e:fd:07:26:ab:e1: 58:96:28:81:c3:dc:7a:5e:86:0d:61:92:ce:8c:8a:6b: b2:c5:e1:19:dc:5e:6d:9c:74:dc:ff:49:30:e8:6e:81: 74:76:94:86:86:1b:b4:4a:69:d7:52:03:ba:93:c5:55: 68:78:e4:76:f7:4c:97:28:e0:b6:b7:21:2c:ba:b7:73: 06:57:b6:48:37:15:ed:33:8b:43:a4:d2:59:8d:e2:e7: 7e:2e:e6:6e:13:97:8b:54:70:ad:24:b4:9e:ce:62:30: e1:c3:dc:6e:06:a5:b3:ca:41:3b:31:ed:3e:03:91:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: cd:a1:19:d3:1f:d7:a9:57:99:0d:f0:b5:5b:85:82:c1: 8f:73:d8:e1:7b:6d:98:ee:01:8d:e8:46:c8:f4:ce:e8: 0a:e4:5d:fa:6b:7b:00:ce:b4:de:ec:a7:6c:69:0c:29: 89:16:b7:b7:c3:c0:9a:1d:db:3a:fe:83:59:f8:58:9a: 82:7a:4e:86:0f:5e:5a:f2:34:15:58:85:1c:67:b4:3b: d3:c3:cf:c2:8a:b4:15:11:4f:2e:cc:f7:58:d8:43:2a: ba:2c:f0:9f:96:dd:90:ba:93:58:7c:8d:cd:e3:9f:42: 6e:4a:8d:1c:b5:33:93:9a:fe:56:39:b4:f0:ea:ff:03 Fingerprint (MD5): 44:A1:EF:54:2B:46:E2:A7:4C:AA:D8:29:2B:E8:3B:43 Fingerprint (SHA1): DC:57:63:FB:AA:55:D4:DD:1C:AC:49:8A:9D:F1:91:AE:D7:24:99:64 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3348: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3349: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161801 (0x420d3509) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:17:46 2011 Not After : Tue Nov 08 16:17:46 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:3d:dc:f0:9f:e2:31:1e:7e:b9:04:7c:7b:e1:0c:07: 43:19:5d:7c:b0:8e:a6:8b:c8:ed:0a:81:45:d0:f0:38: 06:74:f4:8d:b2:42:77:e6:b6:0d:9e:f4:7b:9e:32:ca: 27:6d:a9:32:21:77:08:9c:eb:29:23:cc:a4:fd:3a:1a: b7:a6:3d:3d:b1:0b:1a:59:d8:3f:6a:e6:6e:cd:44:11: 32:a4:e1:2b:ac:63:df:99:b1:c0:50:90:da:18:16:71: 5d:7b:41:de:24:23:5e:04:7c:c9:8a:83:c2:de:80:33: 15:58:c8:4a:a2:e3:bc:f8:30:d7:2d:b0:0f:b5:e5:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 83:90:c8:52:a9:5c:a5:96:27:ad:8e:98:81:20:54:31: 6b:6b:ac:6e:7f:c6:23:43:bf:2b:c1:31:2e:60:ab:07: 46:e1:f6:71:b3:59:94:c7:e3:d3:e0:45:af:b6:7a:21: e0:3f:ca:6c:35:8f:1a:7d:da:28:70:1a:46:0e:90:0b: c9:cc:65:a1:d1:4c:40:b1:d0:dc:d1:ff:34:9d:9f:b6: b7:8c:fd:28:cf:ac:c5:36:dd:b6:2f:ce:df:36:f3:51: d5:f6:83:74:8c:70:ff:b5:de:bd:9b:93:9a:61:1a:7e: b1:2e:16:3c:10:09:24:0f:68:e8:82:a5:39:23:cf:4c Fingerprint (MD5): 26:3F:6A:03:E6:2B:31:3D:11:70:FA:BE:4A:43:E0:86 Fingerprint (SHA1): BA:9B:6C:64:18:50:F8:C9:92:8F:C9:EA:1D:A2:3A:E4:95:40:D8:47 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3350: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3351: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161803 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3352: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3353: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3354: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3355: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161804 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3356: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3357: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3358: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3359: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161805 --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3360: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3361: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3362: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3363: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1108161806 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3364: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der chains.sh: #3365: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3366: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3367: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1108161807 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3368: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der chains.sh: #3369: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3370: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3371: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3372: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3373: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3374: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161803 (0x420d350b) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:47 2011 Not After : Tue Nov 08 16:17:47 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:b7:83:f4:ea:fc:2e:16:54:2c:ab:a9:46:e3:03:3e: 99:53:e5:09:38:c4:b2:c5:f0:b8:8b:dd:c9:6c:3a:d5: f7:2c:d6:18:7b:5a:83:2a:fb:ec:48:1b:a4:c9:af:0d: 0c:38:87:3f:f6:8b:b8:1a:c2:3e:d7:57:4a:47:fc:bb: 16:f5:ea:b0:3c:d7:1b:57:dd:1c:f1:2b:9e:97:36:e2: 7a:34:7a:3d:2c:99:46:a2:a4:bf:51:26:ef:47:fe:8a: 11:b4:7d:a6:ca:8c:c0:cd:12:a4:42:91:1c:14:5f:a5: 1e:cd:61:b1:70:61:70:24:94:fe:2f:4d:f8:75:e9:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 47:30:47:46:59:4f:88:70:4f:05:4e:66:5c:de:71:ce: eb:14:05:94:8b:35:a6:55:e1:0e:f4:c4:06:a1:53:bd: 85:bd:26:ad:bc:54:50:d3:17:9b:b6:06:44:5e:39:2a: 85:2f:2e:26:14:47:f3:02:b3:65:49:f5:0f:b2:55:76: de:49:1e:f9:46:9b:76:3e:ca:5c:8f:ff:72:93:34:aa: 5e:dc:79:61:e1:c7:c9:4a:09:50:91:9d:8f:3c:50:02: ac:0e:ff:2b:0c:b4:52:87:fa:c2:56:11:1f:7f:dd:cf: 5a:ca:0b:dc:82:8a:3f:24:a1:2f:2a:5f:90:60:71:c9 Fingerprint (MD5): 6E:74:80:9D:EB:D1:10:20:07:25:4F:D1:E3:C5:35:4B Fingerprint (SHA1): 1A:94:20:37:F4:A6:01:E9:48:99:47:9C:94:97:16:32:69:A4:7B:1B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3375: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3376: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161804 (0x420d350c) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:17:48 2011 Not After : Tue Nov 08 16:17:48 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:86:fa:50:33:b2:15:93:ee:57:99:5a:d9:07:8d:f7: 4e:83:3d:90:0e:39:b6:61:79:fe:11:5b:61:73:0f:d5: 83:0d:65:ae:89:e5:bc:38:72:93:08:78:db:f2:16:5a: 66:4d:32:57:e7:b8:09:70:2f:35:ae:ca:e8:02:44:dd: 6b:02:e5:c8:7b:ba:f2:05:3e:b3:fb:61:89:0b:e0:ec: 8c:e0:b6:50:bf:87:79:20:4d:34:65:fb:a8:5d:8b:27: 70:40:6d:05:41:27:6d:52:91:8e:77:20:bf:97:53:35: ba:94:e9:2f:4a:e1:a6:a7:e2:28:40:73:ef:43:26:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9d:19:f8:95:f7:95:4d:29:90:a7:cc:d7:08:7b:f9:76: 1c:80:48:78:ea:c6:81:ce:7e:09:af:98:e4:b3:12:61: 43:6c:56:48:fc:d9:ad:47:dc:bd:ef:df:65:6d:af:b4: 13:45:4f:a2:0f:8c:80:6d:54:6a:37:31:bc:9d:21:cb: be:1a:2f:7c:7d:fb:ca:a6:a1:3d:9a:a2:cc:e4:02:7c: ee:e9:7b:c1:58:ab:af:ef:bb:4f:3b:54:dd:31:bf:7d: d4:4c:a4:10:e4:8f:8a:fe:a6:2d:fa:b8:b7:6a:58:7b: 1d:79:71:86:cf:f2:39:ac:97:3c:5e:f5:d4:94:49:56 Fingerprint (MD5): 04:43:44:1E:C3:8D:7E:CD:25:85:EA:36:3F:67:B3:34 Fingerprint (SHA1): 61:1A:06:81:C8:F3:FF:FD:D5:DA:7D:2F:88:FB:64:B3:3F:B0:8E:91 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3377: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3378: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3379: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161805 (0x420d350d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:17:48 2011 Not After : Tue Nov 08 16:17:48 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:11:c8:ca:05:35:ab:ed:de:3f:76:d0:d2:9c:e2:f4: 19:5c:b9:51:d1:69:b9:7d:df:c6:f5:67:cd:f1:74:df: fb:4b:f6:f8:7f:20:5e:88:73:75:f2:8c:d9:36:00:bc: 29:f1:4a:14:49:98:60:f0:f1:ef:0b:02:79:26:f9:fd: b7:a5:9a:19:5a:91:d8:0b:46:c7:52:a3:2e:03:a5:c5: f5:61:aa:4a:7c:31:e5:5e:2d:1d:a5:51:ea:38:d1:19: 88:46:0b:38:54:9e:ca:e1:f0:68:9e:2d:76:e8:e5:a6: 5d:38:47:0d:fd:73:e7:71:dc:50:68:c2:c4:d5:d5:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2c:e8:60:f8:3f:a6:c8:0d:8f:5e:ec:a3:46:1b:a1:fc: a3:0c:b2:c1:89:39:3b:44:58:c3:88:05:11:ef:13:ce: 69:33:67:db:c2:fb:b2:fd:d1:44:c9:4c:82:b8:50:87: a6:1d:e1:a6:e9:b5:65:5b:a1:97:ac:69:82:8a:b8:33: 7c:aa:80:8c:e8:32:78:d2:ce:5a:e1:ae:6a:d8:11:89: 67:b1:bf:d9:38:17:6f:f5:9c:00:d2:36:3f:3f:8f:a7: 01:25:a9:d5:30:8b:fe:6e:69:8a:16:30:65:10:19:10: f8:54:a4:ae:e7:db:9e:36:43:2b:a9:ec:29:da:6d:7c Fingerprint (MD5): F1:12:2F:83:84:24:10:76:BD:2E:A3:50:37:44:9B:7A Fingerprint (SHA1): 7B:59:E9:AE:E6:8D:EB:A2:AE:58:F5:E5:54:59:C8:CC:6E:06:62:87 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3380: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3381: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161808 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3382: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3383: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3384: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3385: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161809 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3386: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3387: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3388: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3389: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108161810 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-CA1Root-1108161718.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3390: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #3391: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3392: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3393: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1108161811 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3394: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #3395: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3396: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3397: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161812 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3398: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3399: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3400: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161813 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3401: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3402: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3403: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3404: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1108161814 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3405: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #3406: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1108161815 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3407: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #3408: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3409: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3410: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3411: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1108161816 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-Bridge-1108161719.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3412: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #3413: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3414: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3415: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161817 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3416: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3417: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3418: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3419: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161818 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3420: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3421: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3422: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161819 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3423: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3424: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3425: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3426: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1108161820 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3427: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #3428: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1108161821 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3429: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #3430: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3431: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3432: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3433: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1108161822 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-Bridge-1108161720.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3434: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #3435: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3436: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3437: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161823 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3438: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3439: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3440: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3441: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1108161824 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-BridgeNavy-1108161721.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3442: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #3443: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3444: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3445: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1108161825 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3446: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #3447: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3448: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3449: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161826 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3450: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3451: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3452: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161827 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3453: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3454: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #3455: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3456: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1108161828 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3457: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der chains.sh: #3458: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #3459: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3460: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1108161829 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3461: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der chains.sh: #3462: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3463: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3464: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1108161830 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3465: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der chains.sh: #3466: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1108161831 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3467: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der chains.sh: #3468: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #3469: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3470: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3471: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1108161832 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3472: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #3473: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3474: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3475: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1108161833 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3476: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #3477: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3478: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3479: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161834 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3480: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3481: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3482: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3483: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1108161835 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3484: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #3485: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3486: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161826 (0x420d3522) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:17:56 2011 Not After : Tue Nov 08 16:17:56 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:04:90:ba:9e:a5:e1:7e:3a:2c:8e:16:31:45:eb:50: 90:f2:b3:b8:2e:05:7f:ee:cc:6a:7c:df:75:87:48:5f: 6e:32:ef:61:89:f6:18:ca:e6:e6:17:3a:cb:cb:f6:67: c8:96:68:f6:d6:91:43:87:f2:20:9b:79:a5:e8:37:78: 85:bc:10:91:19:a4:2b:90:38:64:8c:5d:b5:8d:47:a5: 4c:e4:a1:a2:13:e1:85:45:d2:2f:e3:a1:95:00:01:c8: 21:5c:da:a0:91:f4:a5:9d:37:93:66:d6:28:45:84:9d: 0d:5a:e6:a3:23:c4:73:67:d2:d2:c4:0a:89:67:5a:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 90:47:0f:a7:59:7d:97:6d:1e:8c:6c:07:4f:73:16:9f: 6c:ef:9b:16:c1:ac:86:19:06:c1:ff:44:23:3b:b2:86: ac:bb:93:b9:88:7a:e9:54:ec:27:8d:0e:e1:46:7e:04: ef:8c:00:27:68:e6:89:64:ff:bb:c7:79:a8:63:89:27: 47:bd:29:85:ee:0c:30:0e:72:aa:37:72:3a:14:46:dc: c4:fa:f8:4b:61:73:82:94:11:2d:45:b5:76:4a:fb:06: 75:98:ee:8a:f7:62:11:59:10:cc:6f:52:5b:fa:91:d6: eb:27:62:5b:25:07:04:2d:3f:c4:99:1f:d4:0e:60:70 Fingerprint (MD5): 3D:30:6B:3E:D6:CD:3C:D4:74:C6:08:F7:D3:6E:F8:54 Fingerprint (SHA1): 8D:3E:D8:BB:A2:41:91:CB:84:9F:E3:0C:4B:F2:99:2E:C6:BA:8B:1B Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #3487: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3488: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3489: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3490: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3491: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3492: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3493: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3494: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3495: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161827 (0x420d3523) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:17:56 2011 Not After : Tue Nov 08 16:17:56 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:18:8a:1c:51:c3:3b:c2:c9:03:86:96:7b:97:db:50: 27:44:e8:b6:cf:0d:f6:80:99:52:00:94:2f:50:fd:19: 52:16:82:b1:fc:a3:07:e7:aa:4d:06:f9:bd:77:05:5f: b2:f1:b4:ea:23:d4:8c:60:75:a9:76:a2:8f:b6:69:46: 70:19:b8:73:cf:7d:b6:58:cc:31:7c:18:29:28:4d:44: 6e:ea:0d:bf:b3:c2:8c:f2:01:b6:c4:01:16:42:5d:97: 27:e9:ed:be:37:67:ed:0b:68:ee:24:ff:8f:83:a2:3e: 7f:a6:e6:42:31:78:5d:3a:c6:40:c5:aa:f8:9d:3d:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 69:15:80:7a:99:3f:f6:57:e7:10:0a:09:d3:6a:ff:e8: f6:31:e7:cf:79:2d:66:76:57:67:61:a7:71:c7:64:b4: 5b:ac:03:98:b5:b6:71:b2:98:9f:61:3a:28:c1:46:e4: 27:24:b5:6f:a1:03:70:21:cd:98:fd:0f:65:89:49:4c: e9:4f:01:b6:4a:70:b6:fb:ec:7c:f0:16:a3:6d:ff:c7: cc:07:da:3a:5b:59:69:e3:d1:2c:dd:ff:c7:05:d2:eb: cc:e8:f6:e6:42:5b:47:42:12:dc:47:6b:b8:8c:0c:87: 6f:d3:5e:4d:19:80:5e:e3:34:c2:45:ee:7e:25:05:b2 Fingerprint (MD5): 22:3C:0A:FC:21:98:B6:8A:AC:2C:79:D4:45:23:B1:31 Fingerprint (SHA1): B7:00:34:53:2B:B4:AF:CC:8C:A2:93:14:02:B9:24:95:EF:46:6C:7D Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #3496: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3497: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3498: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3499: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3500: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3501: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3502: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #3503: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #3504: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #3505: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #3506: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #3507: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #3508: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #3509: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3510: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3511: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig n, Inc.",C=US" Validity: Not Before: Wed Nov 08 00:00:00 2006 Not After : Sun Nov 07 23:59:59 2021 Subject: "CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve riSign Trust Network,O="VeriSign, Inc.",C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: CRL Distribution Points Distribution point: URI: "http://crl.verisign.com/pca3.crl" Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: OID.1.3.6.1.5.5.7.1.12 Data: Sequence { [1]: { [0]: { Sequence { Sequence { Sequence { "image/gif" Sequence { Sequence { Sequence { SHA-1 } 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: 80:6a:d4:48:18:2c:7b:19:2e } } Sequence { "http://logo.verisign.com/vslogo.gif" } } } } } } } Name: Certificate Policies Data: Policy Name: Certificate Policies AnyPolicy Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Qualifier Data: "https://www.verisign.com/cps" Name: Certificate Subject Key ID Data: 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: af:33:31:33 Name: Certificate Authority Key Identifier Issuer: Directory Name: "OU=Class 3 Public Primary Certification Auth ority,O="VeriSign, Inc.",C=US" Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 Fingerprint (MD5): C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C Fingerprint (SHA1): 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= US,serialNumber=3014267,businessCategory=Private Organization,incorporati onState=Delaware,incorporationCountry=US" Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network ,O="VeriSign, Inc.",C=US" Returned value is 0, expected result is pass chains.sh: #3512: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #3513: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3514: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161836 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3515: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3516: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3517: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3518: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108161837 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3519: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #3520: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3521: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3522: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108161838 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3523: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #3524: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3525: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3526: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1108161839 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3527: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der chains.sh: #3528: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3529: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3530: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1108161840 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3531: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #3532: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3533: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3534: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1108161841 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3535: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der chains.sh: #3536: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3537: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3538: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1108161842 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3539: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der chains.sh: #3540: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #3541: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3542: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1108161843 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3543: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der chains.sh: #3544: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3545: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3546: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1108161844 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3547: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der chains.sh: #3548: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3549: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161836 (0x420d352c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:18:01 2011 Not After : Tue Nov 08 16:18:01 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 5f:c7:89:5b:30:64:a1:7f:5a:7e:f1:8d:58:87:56:7a: 80:69:4e:84:03:23:0e:5b:5c:52:0e:d2:74:a0:8d:34: 02:7c:31:f5:7a:17:0e:f2:ff:45:09:61:a0:77:4f:1a: cb:9f:a2:96:a9:e4:3b:14:fa:fe:31:6f:e1:84:12:a7: f1:13:b6:ea:c2:3a:3a:08:c1:9c:e4:27:b6:d6:11:88: ea:81:32:1c:69:10:db:72:41:93:c6:aa:64:51:45:8b: 61:18:4f:e6:52:d0:e8:97:b4:34:d0:7a:46:4c:d5:1d: 90:df:3f:7e:e2:24:3e:07:7c:f0:5f:43:82:14:8b:54 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:98:e9:a9:46:3b:9b:c0:b8:36:17:e7: e1:8e:63:53:3b:36:12:95:6c:02:14:07:83:5d:4c:66: 4b:23:91:f9:83:b4:79:70:99:05:af:3f:ce:ee:37 Fingerprint (MD5): F1:2F:A2:E7:A3:82:12:B2:56:E5:85:87:08:CE:A1:F1 Fingerprint (SHA1): FF:36:A1:33:D1:0E:FD:76:EF:60:15:FE:BE:79:74:2B:62:E8:41:CD Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3550: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161836 (0x420d352c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:18:01 2011 Not After : Tue Nov 08 16:18:01 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 5f:c7:89:5b:30:64:a1:7f:5a:7e:f1:8d:58:87:56:7a: 80:69:4e:84:03:23:0e:5b:5c:52:0e:d2:74:a0:8d:34: 02:7c:31:f5:7a:17:0e:f2:ff:45:09:61:a0:77:4f:1a: cb:9f:a2:96:a9:e4:3b:14:fa:fe:31:6f:e1:84:12:a7: f1:13:b6:ea:c2:3a:3a:08:c1:9c:e4:27:b6:d6:11:88: ea:81:32:1c:69:10:db:72:41:93:c6:aa:64:51:45:8b: 61:18:4f:e6:52:d0:e8:97:b4:34:d0:7a:46:4c:d5:1d: 90:df:3f:7e:e2:24:3e:07:7c:f0:5f:43:82:14:8b:54 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:98:e9:a9:46:3b:9b:c0:b8:36:17:e7: e1:8e:63:53:3b:36:12:95:6c:02:14:07:83:5d:4c:66: 4b:23:91:f9:83:b4:79:70:99:05:af:3f:ce:ee:37 Fingerprint (MD5): F1:2F:A2:E7:A3:82:12:B2:56:E5:85:87:08:CE:A1:F1 Fingerprint (SHA1): FF:36:A1:33:D1:0E:FD:76:EF:60:15:FE:BE:79:74:2B:62:E8:41:CD Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3551: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161836 (0x420d352c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:18:01 2011 Not After : Tue Nov 08 16:18:01 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 5f:c7:89:5b:30:64:a1:7f:5a:7e:f1:8d:58:87:56:7a: 80:69:4e:84:03:23:0e:5b:5c:52:0e:d2:74:a0:8d:34: 02:7c:31:f5:7a:17:0e:f2:ff:45:09:61:a0:77:4f:1a: cb:9f:a2:96:a9:e4:3b:14:fa:fe:31:6f:e1:84:12:a7: f1:13:b6:ea:c2:3a:3a:08:c1:9c:e4:27:b6:d6:11:88: ea:81:32:1c:69:10:db:72:41:93:c6:aa:64:51:45:8b: 61:18:4f:e6:52:d0:e8:97:b4:34:d0:7a:46:4c:d5:1d: 90:df:3f:7e:e2:24:3e:07:7c:f0:5f:43:82:14:8b:54 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:98:e9:a9:46:3b:9b:c0:b8:36:17:e7: e1:8e:63:53:3b:36:12:95:6c:02:14:07:83:5d:4c:66: 4b:23:91:f9:83:b4:79:70:99:05:af:3f:ce:ee:37 Fingerprint (MD5): F1:2F:A2:E7:A3:82:12:B2:56:E5:85:87:08:CE:A1:F1 Fingerprint (SHA1): FF:36:A1:33:D1:0E:FD:76:EF:60:15:FE:BE:79:74:2B:62:E8:41:CD Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3552: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108161836 (0x420d352c) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:18:01 2011 Not After : Tue Nov 08 16:18:01 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 5f:c7:89:5b:30:64:a1:7f:5a:7e:f1:8d:58:87:56:7a: 80:69:4e:84:03:23:0e:5b:5c:52:0e:d2:74:a0:8d:34: 02:7c:31:f5:7a:17:0e:f2:ff:45:09:61:a0:77:4f:1a: cb:9f:a2:96:a9:e4:3b:14:fa:fe:31:6f:e1:84:12:a7: f1:13:b6:ea:c2:3a:3a:08:c1:9c:e4:27:b6:d6:11:88: ea:81:32:1c:69:10:db:72:41:93:c6:aa:64:51:45:8b: 61:18:4f:e6:52:d0:e8:97:b4:34:d0:7a:46:4c:d5:1d: 90:df:3f:7e:e2:24:3e:07:7c:f0:5f:43:82:14:8b:54 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:98:e9:a9:46:3b:9b:c0:b8:36:17:e7: e1:8e:63:53:3b:36:12:95:6c:02:14:07:83:5d:4c:66: 4b:23:91:f9:83:b4:79:70:99:05:af:3f:ce:ee:37 Fingerprint (MD5): F1:2F:A2:E7:A3:82:12:B2:56:E5:85:87:08:CE:A1:F1 Fingerprint (SHA1): FF:36:A1:33:D1:0E:FD:76:EF:60:15:FE:BE:79:74:2B:62:E8:41:CD Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #3553: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3554: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3555: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3556: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3557: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3558: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3559: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #3560: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3561: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3562: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3563: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #3564: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3565: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3566: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3567: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #3568: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #3569: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3570: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3571: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der chains.sh: #3572: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3573: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3574: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3575: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #3576: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3577: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3578: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3579: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #3580: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20111108161805Z nextupdate=20121108161805Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Nov 08 16:18:05 2011 Next Update: Thu Nov 08 16:18:05 2012 CRL Extensions: chains.sh: #3581: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161805Z nextupdate=20121108161805Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:18:05 2011 Next Update: Thu Nov 08 16:18:05 2012 CRL Extensions: chains.sh: #3582: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20111108161805Z nextupdate=20121108161805Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Nov 08 16:18:05 2011 Next Update: Thu Nov 08 16:18:05 2012 CRL Extensions: chains.sh: #3583: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20111108161805Z nextupdate=20121108161805Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Nov 08 16:18:05 2011 Next Update: Thu Nov 08 16:18:05 2012 CRL Extensions: chains.sh: #3584: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20111108161806Z addcert 14 20111108161806Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Nov 08 16:18:06 2011 Next Update: Thu Nov 08 16:18:05 2012 Entry (1): Serial Number: 14 (0xe) Revocation Date: Tue Nov 08 16:18:06 2011 CRL Extensions: chains.sh: #3585: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161807Z addcert 15 20111108161807Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:18:07 2011 Next Update: Thu Nov 08 16:18:05 2012 Entry (1): Serial Number: 15 (0xf) Revocation Date: Tue Nov 08 16:18:07 2011 CRL Extensions: chains.sh: #3586: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3587: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3588: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3589: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #3590: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #3591: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #3592: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #3593: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #3594: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #3595: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:18:03 2011 Not After : Tue Nov 08 16:18:03 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:39:5b:5c:70:94:79:f3:c1:f9:29:9a:cb:39:12:5f: a0:95:c7:08:55:fc:a0:01:d1:bb:37:b9:1b:94:e2:97: 1f:3f:8a:28:38:72:d1:83:4a:34:4c:52:c9:dd:a0:9b: 19:a9:01:fa:26:00:57:48:1d:15:20:f9:63:c0:2e:06: cf:b8:21:c0:f4:c3:21:6f:bd:5b:15:e9:bf:5d:08:17: 84:52:83:06:65:9e:12:e9:e0:42:af:31:69:12:a1:7b: dc:fa:09:61:2e:2b:c7:8b:51:12:07:2f:63:0f:da:5c: cc:e3:3d:6c:72:fb:be:13:a4:7d:63:51:09:08:56:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:c9:12:12:2e:6e:f0:fb:8f:df:78:b7:d1:24:29:f2: 77:d0:da:e7:3a:35:6c:ae:71:6d:8b:6a:88:b8:a4:d3: be:0e:3b:e7:4e:10:40:5c:dd:93:fa:d2:84:ee:f0:c8: ed:9c:57:e0:66:64:0c:d9:69:c6:99:05:70:d7:21:32: 22:ed:b5:eb:8e:da:3a:0b:54:98:b6:60:f9:dd:24:cc: 98:c6:16:90:99:8b:f9:2c:ab:5c:92:d0:7b:28:a0:39: c2:3e:a5:e6:2c:9a:de:80:f7:44:7b:97:5d:bb:e8:11: 74:44:2a:84:15:48:98:44:d9:cc:f6:99:0c:24:2b:26 Fingerprint (MD5): EB:F1:75:53:B3:38:21:D3:D3:D8:F1:DB:27:C8:D3:90 Fingerprint (SHA1): EA:00:95:15:6D:2A:F8:6A:6B:BF:B6:BA:2A:F8:80:06:75:7E:B4:69 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3596: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3597: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:18:03 2011 Not After : Tue Nov 08 16:18:03 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:39:5b:5c:70:94:79:f3:c1:f9:29:9a:cb:39:12:5f: a0:95:c7:08:55:fc:a0:01:d1:bb:37:b9:1b:94:e2:97: 1f:3f:8a:28:38:72:d1:83:4a:34:4c:52:c9:dd:a0:9b: 19:a9:01:fa:26:00:57:48:1d:15:20:f9:63:c0:2e:06: cf:b8:21:c0:f4:c3:21:6f:bd:5b:15:e9:bf:5d:08:17: 84:52:83:06:65:9e:12:e9:e0:42:af:31:69:12:a1:7b: dc:fa:09:61:2e:2b:c7:8b:51:12:07:2f:63:0f:da:5c: cc:e3:3d:6c:72:fb:be:13:a4:7d:63:51:09:08:56:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1d:c9:12:12:2e:6e:f0:fb:8f:df:78:b7:d1:24:29:f2: 77:d0:da:e7:3a:35:6c:ae:71:6d:8b:6a:88:b8:a4:d3: be:0e:3b:e7:4e:10:40:5c:dd:93:fa:d2:84:ee:f0:c8: ed:9c:57:e0:66:64:0c:d9:69:c6:99:05:70:d7:21:32: 22:ed:b5:eb:8e:da:3a:0b:54:98:b6:60:f9:dd:24:cc: 98:c6:16:90:99:8b:f9:2c:ab:5c:92:d0:7b:28:a0:39: c2:3e:a5:e6:2c:9a:de:80:f7:44:7b:97:5d:bb:e8:11: 74:44:2a:84:15:48:98:44:d9:cc:f6:99:0c:24:2b:26 Fingerprint (MD5): EB:F1:75:53:B3:38:21:D3:D3:D8:F1:DB:27:C8:D3:90 Fingerprint (SHA1): EA:00:95:15:6D:2A:F8:6A:6B:BF:B6:BA:2A:F8:80:06:75:7E:B4:69 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3598: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3599: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED ./chains.sh: line 806: ping: command not found OCSP server not accessible, skipping OCSP tests chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3600: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -m 1108161845 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #3601: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3602: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3603: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3604: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1108161846 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3605: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #3606: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3607: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 /localhost-18966-CA0-1108161735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3608: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108161722.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3609: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #3610: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3611: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-CA0-1108161735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3612: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1108161847 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3613: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #3614: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3615: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 /localhost-18966-CA0-1108161735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3616: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108161723.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3617: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #3618: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3619: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #3620: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1108161848 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #3621: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #3622: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3623: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-CA0-1108161735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3624: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108161724.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3625: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der chains.sh: #3626: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3627: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-CA0-1108161735.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3628: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108161725.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3629: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der chains.sh: #3630: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20111108161811Z nextupdate=20121108161811Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Nov 08 16:18:11 2011 Next Update: Thu Nov 08 16:18:11 2012 CRL Extensions: chains.sh: #3631: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161811Z nextupdate=20121108161811Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:18:11 2011 Next Update: Thu Nov 08 16:18:11 2012 CRL Extensions: chains.sh: #3632: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20111108161811Z nextupdate=20121108161811Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Nov 08 16:18:11 2011 Next Update: Thu Nov 08 16:18:11 2012 CRL Extensions: chains.sh: #3633: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20111108161811Z nextupdate=20121108161811Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Nov 08 16:18:11 2011 Next Update: Thu Nov 08 16:18:11 2012 CRL Extensions: chains.sh: #3634: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161812Z addcert 20 20111108161812Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:18:12 2011 Next Update: Thu Nov 08 16:18:11 2012 Entry (1): Serial Number: 20 (0x14) Revocation Date: Tue Nov 08 16:18:12 2011 CRL Extensions: chains.sh: #3635: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108161813Z addcert 40 20111108161813Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:18:13 2011 Next Update: Thu Nov 08 16:18:11 2012 Entry (1): Serial Number: 20 (0x14) Revocation Date: Tue Nov 08 16:18:12 2011 Entry (2): Serial Number: 40 (0x28) Revocation Date: Tue Nov 08 16:18:13 2011 CRL Extensions: chains.sh: #3636: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3637: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3638: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3639: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined TIMESTAMP chains END: Tue Nov 8 16:18:13 UTC 2011 chains.sh: Testing with upgraded library =============================== cp: cannot stat `/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/eccurves': No such file or directory cp: cannot stat `/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Tue Nov 8 16:18:13 UTC 2011 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #3640: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #3641: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #3642: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #3643: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #3644: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #3645: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #3646: Upgrading dave - PASSED eccurves skipping db eccurves dbupgrade.sh: #3647: No directory eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #3648: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #3649: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #3650: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #3651: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #3652: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #3653: Upgrading serverCA - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #3654: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... dbupgrade.sh: #3655: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Tue Nov 8 16:18:26 UTC 2011 Running tests for tools TIMESTAMP tools BEGIN: Tue Nov 8 16:18:26 UTC 2011 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3656: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:68:a0:ae:1a:a1:31:78:e0:e1:ce:37:67:d5:58:f1 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3657: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3658: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3659: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 79:3a:6e:59:89:21:03:b8:bf:0a:ed:2e:26:1c:48:25 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3660: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3661: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3662: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 84:7b:af:de:5a:28:40:75:4b:46:74:7a:e0:88:ac:dd Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3663: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3664: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3665: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 3c:6c:1d:e9:e6:0a:8d:04:2e:4d:4b:35:3b:83:f5:b8 Iteration Count: 1 (0x1) tools.sh: #3666: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3667: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3668: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d8:96:6d:a5:20:b6:77:6c:4f:11:3f:5f:c7:c3:f6:df Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3669: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3670: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3671: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:60:29:88:b4:7e:53:9e:5e:ce:96:97:2b:a3:3d:49 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3672: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3673: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3674: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9a:02:fe:85:b7:f9:7b:52:16:0f:8f:36:20:2c:00:9b Iteration Count: 1 (0x1) tools.sh: #3675: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3676: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3677: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 71:22:7b:8e:3b:70:39:4c:be:be:28:3b:33:2e:fd:8d Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:27:20:01:be:85:8f:ed:72:9e:de:dd:ef:88:7b: de:5b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3678: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3679: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3680: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9c:33:b0:06:3c:04:06:c1:c0:2a:88:fa:bb:2f:ae:2f Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:03:38:28:12:67:21:fc:83:76:2b:86:c0:90:01: 13:af Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3681: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3682: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3683: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ea:3d:57:a7:e6:38:f9:f8:2b:b8:67:fa:88:eb:e1:ff Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:bf:fb:2e:4c:03:e4:a4:e5:c7:88:95:5f:cd:75: ae:ee tools.sh: #3684: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3685: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3686: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:b2:d8:73:c3:a9:33:04:87:b7:66:42:73:69:1c:b2 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:b0:83:1b:db:5f:a4:83:98:c4:a8:7b:82:6e:b2: 1c:e4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3687: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3688: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3689: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:dd:20:37:4a:33:1d:09:c4:e4:04:f0:be:cc:51:e5 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:14:ea:ad:de:a4:d4:b2:5e:e4:52:b8:68:78:a6: 31:9f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3690: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3691: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3692: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:8b:39:35:4c:12:7f:25:93:f2:50:45:1e:b1:30:65 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:04:a5:63:f2:bd:e2:9e:63:5c:0b:f1:65:2a:ae: a2:1d tools.sh: #3693: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3694: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3695: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7b:a7:45:d5:27:e5:03:47:ea:2c:da:f2:e0:b3:d6:c0 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0c:9b:1f:ba:2d:c5:c5:19:a4:38:f0:fc:3f:3e: 2b:f1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3696: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3697: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3698: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a8:f1:2f:32:20:0e:a0:dd:66:99:44:8b:61:78:66:bb Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c0:21:f1:bb:37:8c:f5:05:3b:8e:40:d9:5e:7d: dc:1e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3699: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3700: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3701: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e1:94:c5:24:1e:b4:6d:2a:ff:be:b9:24:e5:0d:93:ea Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:26:93:a5:b6:4f:bd:8d:4a:20:53:95:2d:e0:10: 80:52 tools.sh: #3702: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3703: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3704: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ab:d2:a0:55:49:84:cf:cc:b9:d5:78:1b:6f:ba:0e:d6 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:5a:8e:3e:c3:ff:e7:2f:21:cb:71:cc:19:36:d7: 42:8a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3705: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3706: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3707: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d1:fd:ce:a4:5e:a2:55:d2:46:f1:dc:1b:0d:a3:5f:d4 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:21:e8:3a:76:3f:81:4e:12:43:5e:dd:f0:2a:a8: ff:49 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3708: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3709: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3710: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 87:bc:0d:26:24:8b:76:c4:45:55:9b:5e:d9:23:c5:dc Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:72:66:d3:a5:89:57:f5:b6:3c:fe:1e:82:ae:66: 1e:1a tools.sh: #3711: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3712: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3713: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ac:ec:20:72:05:db:11:d2:2c:a0:e2:d0:d9:5f:f6:3c Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:b3:25:4d:d5:a6:a3:2a:01:4c:c8:e6:04:6c:b4: 90:e1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3714: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3715: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3716: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f5:ce:7f:2a:81:76:4c:6c:5c:77:70:81:17:10:eb:5c Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:67:ab:6c:36:c6:c7:5a:ed:36:dd:52:29:fa:ce: 49:c4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3717: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3718: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3719: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 07:bc:3d:ee:20:3d:64:46:0d:c1:1e:8e:83:71:3d:0e Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:5d:4d:46:5d:c8:08:3f:07:f5:a5:55:6d:1f:ee: 1f:36 tools.sh: #3720: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3721: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3722: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: da:05:09:64:0a:b0:8e:21:90:fd:be:6c:2d:a9:fa:99 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:f1:f6:4a:85:62:4d:d0:60:70:e6:6f:9f:29:c4: 6e:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3723: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3724: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3725: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 77:59:14:17:f8:48:f9:6f:84:13:fa:8a:73:3c:50:19 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:62:7c:32:e9:51:05:6a:e2:7b:bd:9e:e6:0c:00: ae:d0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3726: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3727: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3728: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 09:63:2f:62:39:f5:fc:c7:72:91:d6:24:d0:67:f3:0c Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:42:b6:52:5b:46:87:2b:34:5c:c9:97:01:81:80: 4b:d6 tools.sh: #3729: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3730: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3731: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: e6:9e:26:b5:9e:1d:70:c3:11:03:d0:0c:a8:8b:58:22 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3732: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3733: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3734: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: f0:8f:44:55:1c:18:d0:65:62:b5:5c:89:37:fb:0b:f5 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3735: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3736: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3737: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 30:ac:17:b9:42:43:1b:3c:0d:86:5d:01:c0:72:6a:57 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3738: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3739: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3740: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 7b:96:fb:2c:a3:8b:5f:06:c1:b8:0f:bc:ad:62:62:33 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3741: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3742: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3743: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 30:4b:61:24:7c:d5:d4:79:da:3d:d5:5e:b0:ec:73:81 Iteration Count: 1 (0x1) tools.sh: #3744: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3745: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3746: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: f4:eb:93:81:73:52:a7:78:a3:50:56:ae:6a:fa:7f:40 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3747: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3748: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3749: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 6c:d0:cf:20:41:86:1f:ae:75:44:48:19:0c:8a:ca:2f Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3750: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3751: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3752: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 8a:14:02:50:43:6e:30:e3:34:e0:7f:8d:14:7e:74:d9 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3753: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3754: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3755: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: dc:77:c2:b8:cc:17:7f:f0:d8:ba:1f:43:1e:9d:87:5b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3756: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3757: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3758: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 96:a7:c1:40:50:a9:b3:86:c1:51:54:ec:eb:d4:67:29 Iteration Count: 1 (0x1) tools.sh: #3759: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3760: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3761: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: dd:28:af:33:13:da:12:2b:45:d2:87:dc:eb:cf:bd:cc Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3762: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3763: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3764: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 59:98:7f:20:b1:86:91:55:8b:bf:c0:b8:cd:ae:f7:9d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3765: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3766: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3767: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8c:85:3e:9d:27:90:8d:39:ff:a1:4c:7d:dd:38:02:9c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3768: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3769: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3770: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 48:ef:77:79:94:e9:88:18:73:4d:ad:7b:43:01:66:54 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3771: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3772: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3773: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e4:84:b7:e1:3d:ae:ac:56:a9:87:cd:66:5f:25:73:ac Iteration Count: 1 (0x1) tools.sh: #3774: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3775: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3776: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b3:c4:97:f7:19:5b:97:a1:0a:12:90:f2:86:a8:b8:3d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3777: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3778: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3779: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 51:ac:5a:7e:cc:a9:c7:38:4d:37:75:78:f7:e1:ac:e7 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3780: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3781: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3782: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:f6:f3:81:0c:30:f5:2e:e9:b0:a4:c2:c2:c1:06:d8 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3783: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3784: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3785: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4e:f5:c3:8f:50:d4:61:16:67:a0:65:ea:c7:08:2c:66 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3786: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3787: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3788: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cc:25:2f:3e:39:a0:43:36:f7:bb:57:3a:0a:73:0f:f9 Iteration Count: 1 (0x1) tools.sh: #3789: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3790: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3791: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 65:bf:b1:3d:b1:15:7b:4b:cb:fa:b1:17:be:6b:38:82 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3792: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3793: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3794: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 97:58:f7:1b:4a:4c:02:9e:9e:f6:6f:0d:fa:7b:02:b3 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3795: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3796: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3797: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d7:1a:e7:39:1a:2f:7e:2b:f6:8f:14:45:45:6d:c7:25 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3798: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3799: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3800: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cc:d1:f5:93:3d:bb:fa:e1:16:6e:b2:b0:86:b3:cb:45 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3801: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3802: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3803: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bf:9c:91:e5:1f:a4:97:aa:45:ed:88:00:2c:54:16:05 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3804: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3805: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3806: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 59:46:da:6b:e1:f7:bb:f7:12:39:b8:b5:8f:bf:6a:fe Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3807: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3808: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3809: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 79:84:03:b5:17:2c:bd:4f:3f:c6:66:6f:7b:ae:75:63 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3810: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3811: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3812: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:f6:30:a7:ba:f4:e0:02:e8:23:9e:06:4a:f2:e2:f4 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3813: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3814: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3815: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c3:85:06:ba:ff:a2:fc:aa:6c:d1:d3:20:29:86:b5:91 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3816: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3817: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3818: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:fa:f1:0d:17:4f:32:d9:0f:00:ee:27:3a:b4:2a:85 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:53 2011 Not After : Tue Nov 08 16:11:53 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:f9:c4:38:44:1c:93:57:e0:7f:6f:08:9c:35:2a:dd: f4:f6:fa:e4:be:79:76:45:c7:3a:56:cc:90:48:67:96: bc:78:9f:11:cd:d9:6b:24:f3:bd:ce:49:dc:e7:bd:b3: 54:a9:3f:b2:97:4c:25:aa:d4:0b:da:ac:5e:a3:ec:f2: d3:c1:d0:5e:5e:66:c7:8f:0a:88:06:fa:5e:7d:6e:da: 4c:af:c5:09:98:98:63:90:5a:14:9d:7a:4a:39:ac:e6: d4:ef:1c:91:d9:e0:ee:b0:19:d8:2f:c4:5e:14:74:0d: 4a:eb:53:77:34:82:0a:fd:36:ab:01:9c:18:b0:f8:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9e:3f:d0:c2:5e:b0:e7:c8:3e:f0:92:be:a8:61:dc:c7: 5d:93:6a:ca:35:06:7a:93:a4:d6:4f:ff:03:6b:a4:b7: 8c:61:6c:a3:56:c2:f7:d7:21:81:4a:dc:68:15:a6:f3: 9d:b1:49:a3:6f:33:df:e4:66:40:85:db:5d:ba:6d:8e: 14:d1:80:3f:07:38:fa:a8:6a:0e:99:a9:45:45:ef:dd: 45:2b:1a:28:a3:5d:85:a3:de:bb:8b:74:09:4e:0b:f6: 3e:45:d1:57:28:bc:8e:0d:9f:2b:e3:c5:f1:ea:87:40: 5f:c9:3c:dc:83:df:32:d7:9d:6e:6c:8d:9b:e6:a5:2e Fingerprint (MD5): 7F:07:BE:44:8D:89:B3:D7:F8:D7:F7:DD:AF:9B:CA:74 Fingerprint (SHA1): F3:E8:98:70:A9:D0:45:71:A1:3C:2A:34:EE:03:BA:F9:B8:2D:A3:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:11:56 2011 Not After : Tue Nov 08 16:11:56 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:6e:96:2d:35:c5:fa:6e:96:a0:8f:e4:be:58:a1:bb: 28:36:84:a0:b6:64:06:2d:f5:23:bf:de:b9:2b:03:54: e2:e9:a0:6a:dd:9a:50:67:10:db:ae:5f:b9:2a:ee:76: 45:3e:e8:b5:fd:95:78:70:92:6d:b8:df:8b:bd:37:c9: c0:ce:21:b6:e6:7b:c6:ad:6b:e7:e9:19:b6:c8:38:12: ab:fc:88:6b:a5:05:bd:e3:97:d3:ea:72:50:15:eb:a6: 01:08:78:36:a2:e9:b9:7d:80:94:25:c9:1c:59:11:e5: b7:b7:0d:28:09:b1:a3:48:ce:1c:06:e5:f9:82:8b:83 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:7b:b5:57:66:8e:33:42:ef:18:d7:98:24:bd:ab:2e: b6:f7:b0:dc:13:67:21:6d:c8:f2:fb:da:93:76:e7:29: 35:80:ff:32:37:f8:21:07:6d:7d:ca:fe:98:5e:57:69: 2c:4c:3a:18:10:7d:7a:53:66:1b:e0:91:4d:2e:d2:e7: 44:a8:d0:b8:b7:58:e1:45:b8:3a:ce:aa:94:67:27:e2: 21:58:21:a2:11:5e:06:c3:82:d9:4d:be:25:30:55:ab: 15:1e:c6:bb:f8:b1:5f:4d:08:d6:bf:04:45:92:32:19: 52:4f:95:39:d2:c0:ff:84:ec:f7:9b:99:a9:5f:c1:ee Fingerprint (MD5): 3B:3A:56:BD:4F:BE:C1:9F:DA:15:13:46:36:45:7B:14 Fingerprint (SHA1): DF:F6:59:D2:77:05:3A:07:BD:2A:A2:51:2A:C2:40:0A:FF:49:B4:8E Friendly Name: Alice tools.sh: #3819: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #3820: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #3821: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #3822: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #3823: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #3824: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #3825: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #3826: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #3827: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #3828: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #3829: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Tue Nov 8 16:18:46 UTC 2011 Running tests for fips TIMESTAMP fips BEGIN: Tue Nov 8 16:18:46 UTC 2011 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #3830: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #3831: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa cfe47c60c61238885552063846b0ebc7be10fc1a FIPS_PUB_140_Test_Certificate fips.sh: #3832: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #3833: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #3834: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #3835: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #3836: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #3837: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #3838: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #3839: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #3840: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #3841: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #3842: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa cfe47c60c61238885552063846b0ebc7be10fc1a FIPS_PUB_140_Test_Certificate fips.sh: #3843: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #3844: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #3845: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #3846: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #3847: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa cfe47c60c61238885552063846b0ebc7be10fc1a FIPS_PUB_140_Test_Certificate fips.sh: #3848: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #3849: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #3850: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory `/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000d7caf (883887): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #3851: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Tue Nov 8 16:19:08 UTC 2011 Running tests for crmf TIMESTAMP crmf BEGIN: Tue Nov 8 16:19:08 UTC 2011 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #3852: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #3853: CMMF test . - PASSED TIMESTAMP crmf END: Tue Nov 8 16:19:09 UTC 2011 Running tests for smime TIMESTAMP smime BEGIN: Tue Nov 8 16:19:09 UTC 2011 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #3854: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3855: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3856: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #3857: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #3858: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #3859: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3860: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #3861: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #3862: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #3863: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #3864: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3865: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #3866: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #3867: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #3868: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #3869: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #3870: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #3871: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #3872: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #3873: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #3874: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #3875: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #3876: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #3877: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #3878: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #3879: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #3880: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #3881: Decrypt with a Multiple Email cert . - PASSED smime.sh: #3882: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #3883: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #3884: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #3885: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #3886: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #3887: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #3888: Decode Encrypted-Data . - PASSED smime.sh: #3889: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #3890: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #3891: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #3892: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #3893: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #3894: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Tue Nov 8 16:19:11 UTC 2011 Running tests for ssl TIMESTAMP ssl BEGIN: Tue Nov 8 16:19:11 UTC 2011 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12896 >/dev/null 2>/dev/null selfserv_9519 with PID 12896 found at Tue Nov 8 16:19:11 UTC 2011 selfserv_9519 with PID 12896 started at Tue Nov 8 16:19:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3895: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12896 at Tue Nov 8 16:19:11 UTC 2011 kill -USR1 12896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12896 killed at Tue Nov 8 16:19:11 UTC 2011 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12952 >/dev/null 2>/dev/null selfserv_9519 with PID 12952 found at Tue Nov 8 16:19:11 UTC 2011 selfserv_9519 with PID 12952 started at Tue Nov 8 16:19:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3896: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 12952 at Tue Nov 8 16:19:11 UTC 2011 kill -USR1 12952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12952 killed at Tue Nov 8 16:19:11 UTC 2011 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13008 >/dev/null 2>/dev/null selfserv_9519 with PID 13008 found at Tue Nov 8 16:19:11 UTC 2011 selfserv_9519 with PID 13008 started at Tue Nov 8 16:19:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3897: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 13008 at Tue Nov 8 16:19:12 UTC 2011 kill -USR1 13008 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13008 killed at Tue Nov 8 16:19:12 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13076 >/dev/null 2>/dev/null selfserv_9519 with PID 13076 found at Tue Nov 8 16:19:12 UTC 2011 selfserv_9519 with PID 13076 started at Tue Nov 8 16:19:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3898: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 13076 at Tue Nov 8 16:19:12 UTC 2011 kill -USR1 13076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13076 killed at Tue Nov 8 16:19:12 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13132 >/dev/null 2>/dev/null selfserv_9519 with PID 13132 found at Tue Nov 8 16:19:12 UTC 2011 selfserv_9519 with PID 13132 started at Tue Nov 8 16:19:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3899: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 13132 at Tue Nov 8 16:19:12 UTC 2011 kill -USR1 13132 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13132 killed at Tue Nov 8 16:19:12 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13189 >/dev/null 2>/dev/null selfserv_9519 with PID 13189 found at Tue Nov 8 16:19:12 UTC 2011 selfserv_9519 with PID 13189 started at Tue Nov 8 16:19:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3900: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 13189 at Tue Nov 8 16:19:12 UTC 2011 kill -USR1 13189 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13189 killed at Tue Nov 8 16:19:12 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13257 >/dev/null 2>/dev/null selfserv_9519 with PID 13257 found at Tue Nov 8 16:19:12 UTC 2011 selfserv_9519 with PID 13257 started at Tue Nov 8 16:19:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3901: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13257 at Tue Nov 8 16:19:13 UTC 2011 kill -USR1 13257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13257 killed at Tue Nov 8 16:19:13 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13313 >/dev/null 2>/dev/null selfserv_9519 with PID 13313 found at Tue Nov 8 16:19:13 UTC 2011 selfserv_9519 with PID 13313 started at Tue Nov 8 16:19:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3902: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 13313 at Tue Nov 8 16:19:13 UTC 2011 kill -USR1 13313 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13313 killed at Tue Nov 8 16:19:13 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13369 >/dev/null 2>/dev/null selfserv_9519 with PID 13369 found at Tue Nov 8 16:19:13 UTC 2011 selfserv_9519 with PID 13369 started at Tue Nov 8 16:19:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3903: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13369 at Tue Nov 8 16:19:13 UTC 2011 kill -USR1 13369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13369 killed at Tue Nov 8 16:19:13 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13437 >/dev/null 2>/dev/null selfserv_9519 with PID 13437 found at Tue Nov 8 16:19:13 UTC 2011 selfserv_9519 with PID 13437 started at Tue Nov 8 16:19:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3904: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13437 at Tue Nov 8 16:19:13 UTC 2011 kill -USR1 13437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13437 killed at Tue Nov 8 16:19:13 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13493 >/dev/null 2>/dev/null selfserv_9519 with PID 13493 found at Tue Nov 8 16:19:14 UTC 2011 selfserv_9519 with PID 13493 started at Tue Nov 8 16:19:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3905: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13493 at Tue Nov 8 16:19:14 UTC 2011 kill -USR1 13493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13493 killed at Tue Nov 8 16:19:14 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13549 >/dev/null 2>/dev/null selfserv_9519 with PID 13549 found at Tue Nov 8 16:19:14 UTC 2011 selfserv_9519 with PID 13549 started at Tue Nov 8 16:19:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3906: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13549 at Tue Nov 8 16:19:14 UTC 2011 kill -USR1 13549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13549 killed at Tue Nov 8 16:19:14 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13617 >/dev/null 2>/dev/null selfserv_9519 with PID 13617 found at Tue Nov 8 16:19:14 UTC 2011 selfserv_9519 with PID 13617 started at Tue Nov 8 16:19:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3907: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13617 at Tue Nov 8 16:19:14 UTC 2011 kill -USR1 13617 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13617 killed at Tue Nov 8 16:19:14 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:14 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13673 >/dev/null 2>/dev/null selfserv_9519 with PID 13673 found at Tue Nov 8 16:19:14 UTC 2011 selfserv_9519 with PID 13673 started at Tue Nov 8 16:19:14 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3908: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13673 at Tue Nov 8 16:19:15 UTC 2011 kill -USR1 13673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13673 killed at Tue Nov 8 16:19:15 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13731 >/dev/null 2>/dev/null selfserv_9519 with PID 13731 found at Tue Nov 8 16:19:15 UTC 2011 selfserv_9519 with PID 13731 started at Tue Nov 8 16:19:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3909: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13731 at Tue Nov 8 16:19:15 UTC 2011 kill -USR1 13731 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13731 killed at Tue Nov 8 16:19:15 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13799 >/dev/null 2>/dev/null selfserv_9519 with PID 13799 found at Tue Nov 8 16:19:15 UTC 2011 selfserv_9519 with PID 13799 started at Tue Nov 8 16:19:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3910: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13799 at Tue Nov 8 16:19:15 UTC 2011 kill -USR1 13799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13799 killed at Tue Nov 8 16:19:15 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13855 >/dev/null 2>/dev/null selfserv_9519 with PID 13855 found at Tue Nov 8 16:19:15 UTC 2011 selfserv_9519 with PID 13855 started at Tue Nov 8 16:19:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3911: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 13855 at Tue Nov 8 16:19:15 UTC 2011 kill -USR1 13855 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13855 killed at Tue Nov 8 16:19:15 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:15 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13911 >/dev/null 2>/dev/null selfserv_9519 with PID 13911 found at Tue Nov 8 16:19:15 UTC 2011 selfserv_9519 with PID 13911 started at Tue Nov 8 16:19:15 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3912: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 13911 at Tue Nov 8 16:19:16 UTC 2011 kill -USR1 13911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13911 killed at Tue Nov 8 16:19:16 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 13979 >/dev/null 2>/dev/null selfserv_9519 with PID 13979 found at Tue Nov 8 16:19:16 UTC 2011 selfserv_9519 with PID 13979 started at Tue Nov 8 16:19:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3913: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 13979 at Tue Nov 8 16:19:16 UTC 2011 kill -USR1 13979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 13979 killed at Tue Nov 8 16:19:16 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14035 >/dev/null 2>/dev/null selfserv_9519 with PID 14035 found at Tue Nov 8 16:19:16 UTC 2011 selfserv_9519 with PID 14035 started at Tue Nov 8 16:19:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3914: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 14035 at Tue Nov 8 16:19:16 UTC 2011 kill -USR1 14035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14035 killed at Tue Nov 8 16:19:16 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14091 >/dev/null 2>/dev/null selfserv_9519 with PID 14091 found at Tue Nov 8 16:19:16 UTC 2011 selfserv_9519 with PID 14091 started at Tue Nov 8 16:19:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3915: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 14091 at Tue Nov 8 16:19:17 UTC 2011 kill -USR1 14091 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14091 killed at Tue Nov 8 16:19:17 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:17 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14159 >/dev/null 2>/dev/null selfserv_9519 with PID 14159 found at Tue Nov 8 16:19:17 UTC 2011 selfserv_9519 with PID 14159 started at Tue Nov 8 16:19:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3916: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 14159 at Tue Nov 8 16:19:17 UTC 2011 kill -USR1 14159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14159 killed at Tue Nov 8 16:19:17 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:17 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14215 >/dev/null 2>/dev/null selfserv_9519 with PID 14215 found at Tue Nov 8 16:19:17 UTC 2011 selfserv_9519 with PID 14215 started at Tue Nov 8 16:19:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3917: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 14215 at Tue Nov 8 16:19:17 UTC 2011 kill -USR1 14215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14215 killed at Tue Nov 8 16:19:17 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:17 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14271 >/dev/null 2>/dev/null selfserv_9519 with PID 14271 found at Tue Nov 8 16:19:17 UTC 2011 selfserv_9519 with PID 14271 started at Tue Nov 8 16:19:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3918: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 14271 at Tue Nov 8 16:19:17 UTC 2011 kill -USR1 14271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14271 killed at Tue Nov 8 16:19:17 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:17 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14339 >/dev/null 2>/dev/null selfserv_9519 with PID 14339 found at Tue Nov 8 16:19:17 UTC 2011 selfserv_9519 with PID 14339 started at Tue Nov 8 16:19:17 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3919: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14339 at Tue Nov 8 16:19:18 UTC 2011 kill -USR1 14339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14339 killed at Tue Nov 8 16:19:18 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:18 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14395 >/dev/null 2>/dev/null selfserv_9519 with PID 14395 found at Tue Nov 8 16:19:18 UTC 2011 selfserv_9519 with PID 14395 started at Tue Nov 8 16:19:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3920: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 14395 at Tue Nov 8 16:19:18 UTC 2011 kill -USR1 14395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14395 killed at Tue Nov 8 16:19:18 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:18 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14451 >/dev/null 2>/dev/null selfserv_9519 with PID 14451 found at Tue Nov 8 16:19:18 UTC 2011 selfserv_9519 with PID 14451 started at Tue Nov 8 16:19:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3921: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14451 at Tue Nov 8 16:19:18 UTC 2011 kill -USR1 14451 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14451 killed at Tue Nov 8 16:19:18 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:18 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14519 >/dev/null 2>/dev/null selfserv_9519 with PID 14519 found at Tue Nov 8 16:19:18 UTC 2011 selfserv_9519 with PID 14519 started at Tue Nov 8 16:19:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3922: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14519 at Tue Nov 8 16:19:18 UTC 2011 kill -USR1 14519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14519 killed at Tue Nov 8 16:19:18 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:18 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:18 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14575 >/dev/null 2>/dev/null selfserv_9519 with PID 14575 found at Tue Nov 8 16:19:19 UTC 2011 selfserv_9519 with PID 14575 started at Tue Nov 8 16:19:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3923: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14575 at Tue Nov 8 16:19:19 UTC 2011 kill -USR1 14575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14575 killed at Tue Nov 8 16:19:19 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:19 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14635 >/dev/null 2>/dev/null selfserv_9519 with PID 14635 found at Tue Nov 8 16:19:19 UTC 2011 selfserv_9519 with PID 14635 started at Tue Nov 8 16:19:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3924: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14635 at Tue Nov 8 16:19:19 UTC 2011 kill -USR1 14635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14635 killed at Tue Nov 8 16:19:19 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:19 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14703 >/dev/null 2>/dev/null selfserv_9519 with PID 14703 found at Tue Nov 8 16:19:19 UTC 2011 selfserv_9519 with PID 14703 started at Tue Nov 8 16:19:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3925: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14703 at Tue Nov 8 16:19:19 UTC 2011 kill -USR1 14703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14703 killed at Tue Nov 8 16:19:19 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:19 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14759 >/dev/null 2>/dev/null selfserv_9519 with PID 14759 found at Tue Nov 8 16:19:19 UTC 2011 selfserv_9519 with PID 14759 started at Tue Nov 8 16:19:19 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3926: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14759 at Tue Nov 8 16:19:20 UTC 2011 kill -USR1 14759 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14759 killed at Tue Nov 8 16:19:20 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14815 >/dev/null 2>/dev/null selfserv_9519 with PID 14815 found at Tue Nov 8 16:19:20 UTC 2011 selfserv_9519 with PID 14815 started at Tue Nov 8 16:19:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #3927: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14815 at Tue Nov 8 16:19:20 UTC 2011 kill -USR1 14815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14815 killed at Tue Nov 8 16:19:20 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14883 >/dev/null 2>/dev/null selfserv_9519 with PID 14883 found at Tue Nov 8 16:19:20 UTC 2011 selfserv_9519 with PID 14883 started at Tue Nov 8 16:19:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3928: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14883 at Tue Nov 8 16:19:20 UTC 2011 kill -USR1 14883 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14883 killed at Tue Nov 8 16:19:20 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14939 >/dev/null 2>/dev/null selfserv_9519 with PID 14939 found at Tue Nov 8 16:19:20 UTC 2011 selfserv_9519 with PID 14939 started at Tue Nov 8 16:19:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3929: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 14939 at Tue Nov 8 16:19:20 UTC 2011 kill -USR1 14939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14939 killed at Tue Nov 8 16:19:20 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14995 >/dev/null 2>/dev/null selfserv_9519 with PID 14995 found at Tue Nov 8 16:19:21 UTC 2011 selfserv_9519 with PID 14995 started at Tue Nov 8 16:19:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #3930: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 14995 at Tue Nov 8 16:19:21 UTC 2011 kill -USR1 14995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14995 killed at Tue Nov 8 16:19:21 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:21 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15063 >/dev/null 2>/dev/null selfserv_9519 with PID 15063 found at Tue Nov 8 16:19:21 UTC 2011 selfserv_9519 with PID 15063 started at Tue Nov 8 16:19:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3931: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15063 at Tue Nov 8 16:19:21 UTC 2011 kill -USR1 15063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15063 killed at Tue Nov 8 16:19:21 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:21 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15119 >/dev/null 2>/dev/null selfserv_9519 with PID 15119 found at Tue Nov 8 16:19:21 UTC 2011 selfserv_9519 with PID 15119 started at Tue Nov 8 16:19:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3932: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15119 at Tue Nov 8 16:19:21 UTC 2011 kill -USR1 15119 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15119 killed at Tue Nov 8 16:19:21 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:21 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15175 >/dev/null 2>/dev/null selfserv_9519 with PID 15175 found at Tue Nov 8 16:19:21 UTC 2011 selfserv_9519 with PID 15175 started at Tue Nov 8 16:19:21 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3933: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15175 at Tue Nov 8 16:19:22 UTC 2011 kill -USR1 15175 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15175 killed at Tue Nov 8 16:19:22 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:22 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15243 >/dev/null 2>/dev/null selfserv_9519 with PID 15243 found at Tue Nov 8 16:19:22 UTC 2011 selfserv_9519 with PID 15243 started at Tue Nov 8 16:19:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3934: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15243 at Tue Nov 8 16:19:22 UTC 2011 kill -USR1 15243 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15243 killed at Tue Nov 8 16:19:22 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:22 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15299 >/dev/null 2>/dev/null selfserv_9519 with PID 15299 found at Tue Nov 8 16:19:22 UTC 2011 selfserv_9519 with PID 15299 started at Tue Nov 8 16:19:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3935: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15299 at Tue Nov 8 16:19:22 UTC 2011 kill -USR1 15299 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15299 killed at Tue Nov 8 16:19:22 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:22 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15355 >/dev/null 2>/dev/null selfserv_9519 with PID 15355 found at Tue Nov 8 16:19:22 UTC 2011 selfserv_9519 with PID 15355 started at Tue Nov 8 16:19:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3936: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15355 at Tue Nov 8 16:19:22 UTC 2011 kill -USR1 15355 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15355 killed at Tue Nov 8 16:19:22 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:22 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15423 >/dev/null 2>/dev/null selfserv_9519 with PID 15423 found at Tue Nov 8 16:19:22 UTC 2011 selfserv_9519 with PID 15423 started at Tue Nov 8 16:19:22 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3937: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15423 at Tue Nov 8 16:19:23 UTC 2011 kill -USR1 15423 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15423 killed at Tue Nov 8 16:19:23 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:23 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15479 >/dev/null 2>/dev/null selfserv_9519 with PID 15479 found at Tue Nov 8 16:19:23 UTC 2011 selfserv_9519 with PID 15479 started at Tue Nov 8 16:19:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3938: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 15479 at Tue Nov 8 16:19:23 UTC 2011 kill -USR1 15479 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15479 killed at Tue Nov 8 16:19:23 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:23 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15535 >/dev/null 2>/dev/null selfserv_9519 with PID 15535 found at Tue Nov 8 16:19:23 UTC 2011 selfserv_9519 with PID 15535 started at Tue Nov 8 16:19:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: PR_Poll returned 0x29 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3939: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15535 at Tue Nov 8 16:19:23 UTC 2011 kill -USR1 15535 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15535 killed at Tue Nov 8 16:19:23 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:23 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15603 >/dev/null 2>/dev/null selfserv_9519 with PID 15603 found at Tue Nov 8 16:19:23 UTC 2011 selfserv_9519 with PID 15603 started at Tue Nov 8 16:19:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3940: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15603 at Tue Nov 8 16:19:23 UTC 2011 kill -USR1 15603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15603 killed at Tue Nov 8 16:19:23 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:23 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:23 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15659 >/dev/null 2>/dev/null selfserv_9519 with PID 15659 found at Tue Nov 8 16:19:24 UTC 2011 selfserv_9519 with PID 15659 started at Tue Nov 8 16:19:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3941: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15659 at Tue Nov 8 16:19:24 UTC 2011 kill -USR1 15659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15659 killed at Tue Nov 8 16:19:24 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15715 >/dev/null 2>/dev/null selfserv_9519 with PID 15715 found at Tue Nov 8 16:19:24 UTC 2011 selfserv_9519 with PID 15715 started at Tue Nov 8 16:19:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3942: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15715 at Tue Nov 8 16:19:24 UTC 2011 kill -USR1 15715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15715 killed at Tue Nov 8 16:19:24 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15783 >/dev/null 2>/dev/null selfserv_9519 with PID 15783 found at Tue Nov 8 16:19:24 UTC 2011 selfserv_9519 with PID 15783 started at Tue Nov 8 16:19:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3943: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15783 at Tue Nov 8 16:19:24 UTC 2011 kill -USR1 15783 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15783 killed at Tue Nov 8 16:19:24 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:24 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15839 >/dev/null 2>/dev/null selfserv_9519 with PID 15839 found at Tue Nov 8 16:19:24 UTC 2011 selfserv_9519 with PID 15839 started at Tue Nov 8 16:19:24 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3944: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15839 at Tue Nov 8 16:19:25 UTC 2011 kill -USR1 15839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15839 killed at Tue Nov 8 16:19:25 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15895 >/dev/null 2>/dev/null selfserv_9519 with PID 15895 found at Tue Nov 8 16:19:25 UTC 2011 selfserv_9519 with PID 15895 started at Tue Nov 8 16:19:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3945: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15895 at Tue Nov 8 16:19:25 UTC 2011 kill -USR1 15895 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15895 killed at Tue Nov 8 16:19:25 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15963 >/dev/null 2>/dev/null selfserv_9519 with PID 15963 found at Tue Nov 8 16:19:25 UTC 2011 selfserv_9519 with PID 15963 started at Tue Nov 8 16:19:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3946: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 15963 at Tue Nov 8 16:19:25 UTC 2011 kill -USR1 15963 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15963 killed at Tue Nov 8 16:19:25 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16019 >/dev/null 2>/dev/null selfserv_9519 with PID 16019 found at Tue Nov 8 16:19:25 UTC 2011 selfserv_9519 with PID 16019 started at Tue Nov 8 16:19:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3947: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16019 at Tue Nov 8 16:19:25 UTC 2011 kill -USR1 16019 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16019 killed at Tue Nov 8 16:19:25 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16075 >/dev/null 2>/dev/null selfserv_9519 with PID 16075 found at Tue Nov 8 16:19:25 UTC 2011 selfserv_9519 with PID 16075 started at Tue Nov 8 16:19:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3948: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16075 at Tue Nov 8 16:19:26 UTC 2011 kill -USR1 16075 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16075 killed at Tue Nov 8 16:19:26 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16143 >/dev/null 2>/dev/null selfserv_9519 with PID 16143 found at Tue Nov 8 16:19:26 UTC 2011 selfserv_9519 with PID 16143 started at Tue Nov 8 16:19:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3949: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16143 at Tue Nov 8 16:19:26 UTC 2011 kill -USR1 16143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16143 killed at Tue Nov 8 16:19:26 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16199 >/dev/null 2>/dev/null selfserv_9519 with PID 16199 found at Tue Nov 8 16:19:26 UTC 2011 selfserv_9519 with PID 16199 started at Tue Nov 8 16:19:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3950: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16199 at Tue Nov 8 16:19:26 UTC 2011 kill -USR1 16199 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16199 killed at Tue Nov 8 16:19:26 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16255 >/dev/null 2>/dev/null selfserv_9519 with PID 16255 found at Tue Nov 8 16:19:26 UTC 2011 selfserv_9519 with PID 16255 started at Tue Nov 8 16:19:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3951: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16255 at Tue Nov 8 16:19:26 UTC 2011 kill -USR1 16255 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16255 killed at Tue Nov 8 16:19:26 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:26 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:26 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16323 >/dev/null 2>/dev/null selfserv_9519 with PID 16323 found at Tue Nov 8 16:19:27 UTC 2011 selfserv_9519 with PID 16323 started at Tue Nov 8 16:19:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3952: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16323 at Tue Nov 8 16:19:27 UTC 2011 kill -USR1 16323 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16323 killed at Tue Nov 8 16:19:27 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16379 >/dev/null 2>/dev/null selfserv_9519 with PID 16379 found at Tue Nov 8 16:19:27 UTC 2011 selfserv_9519 with PID 16379 started at Tue Nov 8 16:19:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3953: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16379 at Tue Nov 8 16:19:27 UTC 2011 kill -USR1 16379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16379 killed at Tue Nov 8 16:19:27 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16435 >/dev/null 2>/dev/null selfserv_9519 with PID 16435 found at Tue Nov 8 16:19:27 UTC 2011 selfserv_9519 with PID 16435 started at Tue Nov 8 16:19:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3954: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16435 at Tue Nov 8 16:19:27 UTC 2011 kill -USR1 16435 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16435 killed at Tue Nov 8 16:19:27 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:27 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16503 >/dev/null 2>/dev/null selfserv_9519 with PID 16503 found at Tue Nov 8 16:19:27 UTC 2011 selfserv_9519 with PID 16503 started at Tue Nov 8 16:19:27 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3955: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16503 at Tue Nov 8 16:19:28 UTC 2011 kill -USR1 16503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16503 killed at Tue Nov 8 16:19:28 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16565 >/dev/null 2>/dev/null selfserv_9519 with PID 16565 found at Tue Nov 8 16:19:28 UTC 2011 selfserv_9519 with PID 16565 started at Tue Nov 8 16:19:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3956: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 16565 at Tue Nov 8 16:19:28 UTC 2011 kill -USR1 16565 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16565 killed at Tue Nov 8 16:19:28 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16621 >/dev/null 2>/dev/null selfserv_9519 with PID 16621 found at Tue Nov 8 16:19:28 UTC 2011 selfserv_9519 with PID 16621 started at Tue Nov 8 16:19:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3957: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16621 at Tue Nov 8 16:19:28 UTC 2011 kill -USR1 16621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16621 killed at Tue Nov 8 16:19:28 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16689 >/dev/null 2>/dev/null selfserv_9519 with PID 16689 found at Tue Nov 8 16:19:28 UTC 2011 selfserv_9519 with PID 16689 started at Tue Nov 8 16:19:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3958: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16689 at Tue Nov 8 16:19:28 UTC 2011 kill -USR1 16689 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16689 killed at Tue Nov 8 16:19:28 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:28 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:28 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16745 >/dev/null 2>/dev/null selfserv_9519 with PID 16745 found at Tue Nov 8 16:19:29 UTC 2011 selfserv_9519 with PID 16745 started at Tue Nov 8 16:19:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3959: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16745 at Tue Nov 8 16:19:29 UTC 2011 kill -USR1 16745 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16745 killed at Tue Nov 8 16:19:29 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16805 >/dev/null 2>/dev/null selfserv_9519 with PID 16805 found at Tue Nov 8 16:19:29 UTC 2011 selfserv_9519 with PID 16805 started at Tue Nov 8 16:19:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3960: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16805 at Tue Nov 8 16:19:29 UTC 2011 kill -USR1 16805 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16805 killed at Tue Nov 8 16:19:29 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16873 >/dev/null 2>/dev/null selfserv_9519 with PID 16873 found at Tue Nov 8 16:19:29 UTC 2011 selfserv_9519 with PID 16873 started at Tue Nov 8 16:19:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3961: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16873 at Tue Nov 8 16:19:29 UTC 2011 kill -USR1 16873 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16873 killed at Tue Nov 8 16:19:29 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16929 >/dev/null 2>/dev/null selfserv_9519 with PID 16929 found at Tue Nov 8 16:19:29 UTC 2011 selfserv_9519 with PID 16929 started at Tue Nov 8 16:19:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3962: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16929 at Tue Nov 8 16:19:30 UTC 2011 kill -USR1 16929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16929 killed at Tue Nov 8 16:19:30 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:19:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16985 >/dev/null 2>/dev/null selfserv_9519 with PID 16985 found at Tue Nov 8 16:19:30 UTC 2011 selfserv_9519 with PID 16985 started at Tue Nov 8 16:19:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #3963: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 16985 at Tue Nov 8 16:19:30 UTC 2011 kill -USR1 16985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16985 killed at Tue Nov 8 16:19:30 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17053 >/dev/null 2>/dev/null selfserv_9519 with PID 17053 found at Tue Nov 8 16:19:30 UTC 2011 selfserv_9519 with PID 17053 started at Tue Nov 8 16:19:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3964: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 17053 at Tue Nov 8 16:19:30 UTC 2011 kill -USR1 17053 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17053 killed at Tue Nov 8 16:19:30 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17109 >/dev/null 2>/dev/null selfserv_9519 with PID 17109 found at Tue Nov 8 16:19:30 UTC 2011 selfserv_9519 with PID 17109 started at Tue Nov 8 16:19:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #3965: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 17109 at Tue Nov 8 16:19:30 UTC 2011 kill -USR1 17109 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17109 killed at Tue Nov 8 16:19:30 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17165 >/dev/null 2>/dev/null selfserv_9519 with PID 17165 found at Tue Nov 8 16:19:30 UTC 2011 selfserv_9519 with PID 17165 started at Tue Nov 8 16:19:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #3966: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 17165 at Tue Nov 8 16:19:31 UTC 2011 kill -USR1 17165 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17165 killed at Tue Nov 8 16:19:31 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9519 starting at Tue Nov 8 16:19:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:31 UTC 2011 selfserv_9519 with PID 17237 started at Tue Nov 8 16:19:31 UTC 2011 Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:31 UTC 2011 ssl.sh: #3967: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:31 UTC 2011 ssl.sh: #3968: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:31 UTC 2011 ssl.sh: #3969: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:31 UTC 2011 ssl.sh: #3970: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:31 UTC 2011 ssl.sh: #3971: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:31 UTC 2011 ssl.sh: #3972: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3973: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3974: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3975: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3976: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3977: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3978: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3979: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #3980: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3981: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3982: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:32 UTC 2011 ssl.sh: #3983: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3984: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3985: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3986: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3987: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3988: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3989: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3990: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3991: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3992: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:33 UTC 2011 ssl.sh: #3993: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #3994: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #3995: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #3996: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #3997: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #3998: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #3999: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #4000: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #4001: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #4002: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #4003: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:34 UTC 2011 ssl.sh: #4004: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:35 UTC 2011 ssl.sh: #4005: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:35 UTC 2011 ssl.sh: #4006: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 17237 >/dev/null 2>/dev/null selfserv_9519 with PID 17237 found at Tue Nov 8 16:19:35 UTC 2011 ssl.sh: #4007: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 17237 at Tue Nov 8 16:19:35 UTC 2011 kill -USR1 17237 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17237 killed at Tue Nov 8 16:19:35 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:35 UTC 2011 selfserv_9519 with PID 18665 started at Tue Nov 8 16:19:35 UTC 2011 Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:35 UTC 2011 ssl.sh: #4008: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:35 UTC 2011 ssl.sh: #4009: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:35 UTC 2011 ssl.sh: #4010: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:35 UTC 2011 ssl.sh: #4011: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:35 UTC 2011 ssl.sh: #4012: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4013: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4014: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4015: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4016: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4017: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4018: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4019: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4020: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4021: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4022: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:36 UTC 2011 ssl.sh: #4023: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4024: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4025: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4026: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4027: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4028: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4029: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4030: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4031: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4032: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:37 UTC 2011 ssl.sh: #4033: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4034: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4035: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4036: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4037: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4038: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4039: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4040: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4041: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4042: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4043: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:38 UTC 2011 ssl.sh: #4044: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:39 UTC 2011 ssl.sh: #4045: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:39 UTC 2011 ssl.sh: #4046: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:39 UTC 2011 ssl.sh: #4047: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 18665 >/dev/null 2>/dev/null selfserv_9519 with PID 18665 found at Tue Nov 8 16:19:39 UTC 2011 ssl.sh: #4048: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 18665 at Tue Nov 8 16:19:39 UTC 2011 kill -USR1 18665 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18665 killed at Tue Nov 8 16:19:39 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20094 >/dev/null 2>/dev/null selfserv_9519 with PID 20094 found at Tue Nov 8 16:19:39 UTC 2011 selfserv_9519 with PID 20094 started at Tue Nov 8 16:19:39 UTC 2011 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 20094 at Tue Nov 8 16:19:39 UTC 2011 kill -USR1 20094 ./ssl.sh: line 207: 20094 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20094 killed at Tue Nov 8 16:19:39 UTC 2011 selfserv_9519 starting at Tue Nov 8 16:19:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:39 UTC 2011 selfserv_9519 with PID 20136 started at Tue Nov 8 16:19:39 UTC 2011 Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:39 UTC 2011 ssl.sh: #4049: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:39 UTC 2011 ssl.sh: #4050: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:39 UTC 2011 ssl.sh: #4051: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4052: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4053: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4054: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4055: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4056: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4057: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4058: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4059: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4060: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:40 UTC 2011 ssl.sh: #4061: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4062: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ssl.sh: #4063: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ssl.sh: #4064: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ssl.sh: #4065: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ssl.sh: #4066: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ssl.sh: #4067: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ssl.sh: #4068: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ssl.sh: #4069: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ssl.sh: #4070: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:41 UTC 2011 ssl.sh: #4071: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ssl.sh: #4072: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ssl.sh: #4073: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ssl.sh: #4074: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ssl.sh: #4075: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4076: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ssl.sh: #4077: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ssl.sh: #4078: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ssl.sh: #4079: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ssl.sh: #4080: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:42 UTC 2011 ssl.sh: #4081: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:43 UTC 2011 ssl.sh: #4082: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:43 UTC 2011 ssl.sh: #4083: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:43 UTC 2011 ssl.sh: #4084: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:43 UTC 2011 ssl.sh: #4085: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:43 UTC 2011 ssl.sh: #4086: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:43 UTC 2011 ssl.sh: #4087: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:43 UTC 2011 ssl.sh: #4088: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 20136 >/dev/null 2>/dev/null selfserv_9519 with PID 20136 found at Tue Nov 8 16:19:43 UTC 2011 ssl.sh: #4089: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 20136 at Tue Nov 8 16:19:43 UTC 2011 kill -USR1 20136 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 20136 killed at Tue Nov 8 16:19:43 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:43 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:43 UTC 2011 selfserv_9519 with PID 21556 started at Tue Nov 8 16:19:43 UTC 2011 Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4090: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4091: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4092: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4093: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4094: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4095: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4096: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4097: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4098: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:44 UTC 2011 ssl.sh: #4099: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ssl.sh: #4100: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ssl.sh: #4101: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ssl.sh: #4102: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4103: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ssl.sh: #4104: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ssl.sh: #4105: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ssl.sh: #4106: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ssl.sh: #4107: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ssl.sh: #4108: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:45 UTC 2011 ssl.sh: #4109: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ssl.sh: #4110: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ssl.sh: #4111: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ssl.sh: #4112: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ssl.sh: #4113: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ssl.sh: #4114: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ssl.sh: #4115: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ssl.sh: #4116: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4117: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ssl.sh: #4118: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:46 UTC 2011 ssl.sh: #4119: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4120: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4121: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4122: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4123: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4124: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4125: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4126: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4127: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4128: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:47 UTC 2011 ssl.sh: #4129: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 21556 >/dev/null 2>/dev/null selfserv_9519 with PID 21556 found at Tue Nov 8 16:19:48 UTC 2011 ssl.sh: #4130: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 21556 at Tue Nov 8 16:19:48 UTC 2011 kill -USR1 21556 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 21556 killed at Tue Nov 8 16:19:48 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 22976 >/dev/null 2>/dev/null selfserv_9519 with PID 22976 found at Tue Nov 8 16:19:48 UTC 2011 selfserv_9519 with PID 22976 started at Tue Nov 8 16:19:48 UTC 2011 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 22976 at Tue Nov 8 16:19:48 UTC 2011 kill -USR1 22976 ./ssl.sh: line 207: 22976 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 22976 killed at Tue Nov 8 16:19:48 UTC 2011 selfserv_9519 starting at Tue Nov 8 16:19:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:48 UTC 2011 selfserv_9519 with PID 23018 started at Tue Nov 8 16:19:48 UTC 2011 Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:48 UTC 2011 ssl.sh: #4131: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:48 UTC 2011 ssl.sh: #4132: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:48 UTC 2011 ssl.sh: #4133: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:48 UTC 2011 ssl.sh: #4134: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:48 UTC 2011 ssl.sh: #4135: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:48 UTC 2011 ssl.sh: #4136: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ssl.sh: #4137: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ssl.sh: #4138: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ssl.sh: #4139: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ssl.sh: #4140: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ssl.sh: #4141: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ssl.sh: #4142: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ssl.sh: #4143: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4144: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ssl.sh: #4145: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:49 UTC 2011 ssl.sh: #4146: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4147: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4148: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4149: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4150: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4151: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4152: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4153: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4154: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4155: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:50 UTC 2011 ssl.sh: #4156: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ssl.sh: #4157: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4158: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ssl.sh: #4159: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ssl.sh: #4160: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ssl.sh: #4161: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ssl.sh: #4162: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ssl.sh: #4163: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ssl.sh: #4164: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ssl.sh: #4165: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:51 UTC 2011 ssl.sh: #4166: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:52 UTC 2011 ssl.sh: #4167: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:52 UTC 2011 ssl.sh: #4168: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:52 UTC 2011 ssl.sh: #4169: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:52 UTC 2011 ssl.sh: #4170: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 23018 >/dev/null 2>/dev/null selfserv_9519 with PID 23018 found at Tue Nov 8 16:19:52 UTC 2011 ssl.sh: #4171: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 23018 at Tue Nov 8 16:19:52 UTC 2011 kill -USR1 23018 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 23018 killed at Tue Nov 8 16:19:52 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:52 UTC 2011 selfserv_9519 with PID 24442 started at Tue Nov 8 16:19:52 UTC 2011 Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:52 UTC 2011 ssl.sh: #4172: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:52 UTC 2011 ssl.sh: #4173: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:52 UTC 2011 ssl.sh: #4174: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4175: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4176: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4177: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4178: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4179: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4180: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4181: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4182: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4183: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:53 UTC 2011 ssl.sh: #4184: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4185: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ssl.sh: #4186: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ssl.sh: #4187: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ssl.sh: #4188: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ssl.sh: #4189: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ssl.sh: #4190: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ssl.sh: #4191: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ssl.sh: #4192: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ssl.sh: #4193: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:54 UTC 2011 ssl.sh: #4194: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ssl.sh: #4195: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ssl.sh: #4196: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ssl.sh: #4197: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ssl.sh: #4198: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 119 bytes tstclnt: Writing 119 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4199: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ssl.sh: #4200: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ssl.sh: #4201: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ssl.sh: #4202: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ssl.sh: #4203: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:55 UTC 2011 ssl.sh: #4204: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: #4205: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: #4206: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: #4207: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: #4208: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: #4209: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: #4210: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: #4211: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 24442 >/dev/null 2>/dev/null selfserv_9519 with PID 24442 found at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: #4212: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 24442 at Tue Nov 8 16:19:56 UTC 2011 kill -USR1 24442 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 24442 killed at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:19:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 25866 >/dev/null 2>/dev/null selfserv_9519 with PID 25866 found at Tue Nov 8 16:19:56 UTC 2011 selfserv_9519 with PID 25866 started at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 25866 at Tue Nov 8 16:19:56 UTC 2011 kill -USR1 25866 ./ssl.sh: line 207: 25866 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 25866 killed at Tue Nov 8 16:19:56 UTC 2011 ssl.sh: SSL Stress Test - server bypass/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:19:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26214 >/dev/null 2>/dev/null selfserv_9519 with PID 26214 found at Tue Nov 8 16:19:57 UTC 2011 selfserv_9519 with PID 26214 started at Tue Nov 8 16:19:57 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Tue Nov 8 16:19:57 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Tue Nov 8 16:19:57 UTC 2011 ssl.sh: #4213: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26214 at Tue Nov 8 16:19:57 UTC 2011 kill -USR1 26214 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26214 killed at Tue Nov 8 16:19:57 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:19:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26290 >/dev/null 2>/dev/null selfserv_9519 with PID 26290 found at Tue Nov 8 16:19:57 UTC 2011 selfserv_9519 with PID 26290 started at Tue Nov 8 16:19:57 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:19:57 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:19:57 UTC 2011 ssl.sh: #4214: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26290 at Tue Nov 8 16:19:57 UTC 2011 kill -USR1 26290 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26290 killed at Tue Nov 8 16:19:57 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:19:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26366 >/dev/null 2>/dev/null selfserv_9519 with PID 26366 found at Tue Nov 8 16:19:57 UTC 2011 selfserv_9519 with PID 26366 started at Tue Nov 8 16:19:58 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:19:58 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:19:58 UTC 2011 ssl.sh: #4215: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26366 at Tue Nov 8 16:19:58 UTC 2011 kill -USR1 26366 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26366 killed at Tue Nov 8 16:19:58 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:19:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26442 >/dev/null 2>/dev/null selfserv_9519 with PID 26442 found at Tue Nov 8 16:19:58 UTC 2011 selfserv_9519 with PID 26442 started at Tue Nov 8 16:19:58 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:19:58 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:19:58 UTC 2011 ssl.sh: #4216: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26442 at Tue Nov 8 16:19:58 UTC 2011 kill -USR1 26442 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26442 killed at Tue Nov 8 16:19:58 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:19:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26518 >/dev/null 2>/dev/null selfserv_9519 with PID 26518 found at Tue Nov 8 16:19:58 UTC 2011 selfserv_9519 with PID 26518 started at Tue Nov 8 16:19:58 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:19:58 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:19:59 UTC 2011 ssl.sh: #4217: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26518 at Tue Nov 8 16:19:59 UTC 2011 kill -USR1 26518 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26518 killed at Tue Nov 8 16:19:59 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:19:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26598 >/dev/null 2>/dev/null selfserv_9519 with PID 26598 found at Tue Nov 8 16:19:59 UTC 2011 selfserv_9519 with PID 26598 started at Tue Nov 8 16:19:59 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:19:59 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:19:59 UTC 2011 ssl.sh: #4218: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26598 at Tue Nov 8 16:19:59 UTC 2011 kill -USR1 26598 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26598 killed at Tue Nov 8 16:19:59 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:19:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:19:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26674 >/dev/null 2>/dev/null selfserv_9519 with PID 26674 found at Tue Nov 8 16:19:59 UTC 2011 selfserv_9519 with PID 26674 started at Tue Nov 8 16:19:59 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:19:59 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:20:00 UTC 2011 ssl.sh: #4219: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26674 at Tue Nov 8 16:20:00 UTC 2011 kill -USR1 26674 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26674 killed at Tue Nov 8 16:20:00 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:20:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26750 >/dev/null 2>/dev/null selfserv_9519 with PID 26750 found at Tue Nov 8 16:20:00 UTC 2011 selfserv_9519 with PID 26750 started at Tue Nov 8 16:20:00 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:00 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:20:00 UTC 2011 ssl.sh: #4220: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26750 at Tue Nov 8 16:20:00 UTC 2011 kill -USR1 26750 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26750 killed at Tue Nov 8 16:20:00 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9519 starting at Tue Nov 8 16:20:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26832 >/dev/null 2>/dev/null selfserv_9519 with PID 26832 found at Tue Nov 8 16:20:00 UTC 2011 selfserv_9519 with PID 26832 started at Tue Nov 8 16:20:00 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:00 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:20:01 UTC 2011 ssl.sh: #4221: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26832 at Tue Nov 8 16:20:01 UTC 2011 kill -USR1 26832 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26832 killed at Tue Nov 8 16:20:01 UTC 2011 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 26929 >/dev/null 2>/dev/null selfserv_9519 with PID 26929 found at Tue Nov 8 16:20:01 UTC 2011 selfserv_9519 with PID 26929 started at Tue Nov 8 16:20:01 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:01 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:20:02 UTC 2011 ssl.sh: #4222: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 26929 at Tue Nov 8 16:20:02 UTC 2011 kill -USR1 26929 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 26929 killed at Tue Nov 8 16:20:02 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27004 >/dev/null 2>/dev/null selfserv_9519 with PID 27004 found at Tue Nov 8 16:20:02 UTC 2011 selfserv_9519 with PID 27004 started at Tue Nov 8 16:20:02 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:02 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:20:02 UTC 2011 ssl.sh: #4223: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27004 at Tue Nov 8 16:20:02 UTC 2011 kill -USR1 27004 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27004 killed at Tue Nov 8 16:20:02 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27079 >/dev/null 2>/dev/null selfserv_9519 with PID 27079 found at Tue Nov 8 16:20:02 UTC 2011 selfserv_9519 with PID 27079 started at Tue Nov 8 16:20:02 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:02 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:20:03 UTC 2011 ssl.sh: #4224: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27079 at Tue Nov 8 16:20:03 UTC 2011 kill -USR1 27079 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27079 killed at Tue Nov 8 16:20:03 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:03 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27154 >/dev/null 2>/dev/null selfserv_9519 with PID 27154 found at Tue Nov 8 16:20:03 UTC 2011 selfserv_9519 with PID 27154 started at Tue Nov 8 16:20:03 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:03 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:20:03 UTC 2011 ssl.sh: #4225: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27154 at Tue Nov 8 16:20:03 UTC 2011 kill -USR1 27154 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27154 killed at Tue Nov 8 16:20:03 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:03 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27230 >/dev/null 2>/dev/null selfserv_9519 with PID 27230 found at Tue Nov 8 16:20:03 UTC 2011 selfserv_9519 with PID 27230 started at Tue Nov 8 16:20:03 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:03 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:20:03 UTC 2011 ssl.sh: #4226: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27230 at Tue Nov 8 16:20:03 UTC 2011 kill -USR1 27230 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27230 killed at Tue Nov 8 16:20:04 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:20:04 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:04 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27306 >/dev/null 2>/dev/null selfserv_9519 with PID 27306 found at Tue Nov 8 16:20:04 UTC 2011 selfserv_9519 with PID 27306 started at Tue Nov 8 16:20:04 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:04 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:20:04 UTC 2011 ssl.sh: #4227: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27306 at Tue Nov 8 16:20:04 UTC 2011 kill -USR1 27306 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27306 killed at Tue Nov 8 16:20:04 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:04 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:04 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27382 >/dev/null 2>/dev/null selfserv_9519 with PID 27382 found at Tue Nov 8 16:20:04 UTC 2011 selfserv_9519 with PID 27382 started at Tue Nov 8 16:20:04 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:04 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:20:04 UTC 2011 ssl.sh: #4228: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27382 at Tue Nov 8 16:20:04 UTC 2011 kill -USR1 27382 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27382 killed at Tue Nov 8 16:20:04 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:20:04 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:04 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27458 >/dev/null 2>/dev/null selfserv_9519 with PID 27458 found at Tue Nov 8 16:20:04 UTC 2011 selfserv_9519 with PID 27458 started at Tue Nov 8 16:20:04 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:04 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:20:04 UTC 2011 ssl.sh: #4229: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27458 at Tue Nov 8 16:20:04 UTC 2011 kill -USR1 27458 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27458 killed at Tue Nov 8 16:20:04 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9519 starting at Tue Nov 8 16:20:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27540 >/dev/null 2>/dev/null selfserv_9519 with PID 27540 found at Tue Nov 8 16:20:05 UTC 2011 selfserv_9519 with PID 27540 started at Tue Nov 8 16:20:05 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:20:05 UTC 2011 ssl.sh: #4230: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27540 at Tue Nov 8 16:20:05 UTC 2011 kill -USR1 27540 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27540 killed at Tue Nov 8 16:20:05 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9519 starting at Tue Nov 8 16:20:05 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:05 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 27622 >/dev/null 2>/dev/null selfserv_9519 with PID 27622 found at Tue Nov 8 16:20:05 UTC 2011 selfserv_9519 with PID 27622 started at Tue Nov 8 16:20:05 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:05 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:20:06 UTC 2011 ssl.sh: #4231: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 27622 at Tue Nov 8 16:20:06 UTC 2011 kill -USR1 27622 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 27622 killed at Tue Nov 8 16:20:06 UTC 2011 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:20:06 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28079 >/dev/null 2>/dev/null selfserv_9519 with PID 28079 found at Tue Nov 8 16:20:06 UTC 2011 selfserv_9519 with PID 28079 started at Tue Nov 8 16:20:06 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:06 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:20:06 UTC 2011 ssl.sh: #4232: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28079 at Tue Nov 8 16:20:06 UTC 2011 kill -USR1 28079 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28079 killed at Tue Nov 8 16:20:06 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:20:06 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:06 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28155 >/dev/null 2>/dev/null selfserv_9519 with PID 28155 found at Tue Nov 8 16:20:06 UTC 2011 selfserv_9519 with PID 28155 started at Tue Nov 8 16:20:06 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:06 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:20:07 UTC 2011 ssl.sh: #4233: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28155 at Tue Nov 8 16:20:07 UTC 2011 kill -USR1 28155 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28155 killed at Tue Nov 8 16:20:07 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:20:07 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28231 >/dev/null 2>/dev/null selfserv_9519 with PID 28231 found at Tue Nov 8 16:20:07 UTC 2011 selfserv_9519 with PID 28231 started at Tue Nov 8 16:20:07 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:07 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:20:07 UTC 2011 ssl.sh: #4234: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28231 at Tue Nov 8 16:20:07 UTC 2011 kill -USR1 28231 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28231 killed at Tue Nov 8 16:20:07 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:20:07 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28307 >/dev/null 2>/dev/null selfserv_9519 with PID 28307 found at Tue Nov 8 16:20:07 UTC 2011 selfserv_9519 with PID 28307 started at Tue Nov 8 16:20:07 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:07 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:20:08 UTC 2011 ssl.sh: #4235: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28307 at Tue Nov 8 16:20:08 UTC 2011 kill -USR1 28307 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28307 killed at Tue Nov 8 16:20:08 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:20:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28383 >/dev/null 2>/dev/null selfserv_9519 with PID 28383 found at Tue Nov 8 16:20:08 UTC 2011 selfserv_9519 with PID 28383 started at Tue Nov 8 16:20:08 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:08 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:20:08 UTC 2011 ssl.sh: #4236: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28383 at Tue Nov 8 16:20:08 UTC 2011 kill -USR1 28383 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28383 killed at Tue Nov 8 16:20:08 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:20:08 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:08 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28459 >/dev/null 2>/dev/null selfserv_9519 with PID 28459 found at Tue Nov 8 16:20:08 UTC 2011 selfserv_9519 with PID 28459 started at Tue Nov 8 16:20:08 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:08 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:20:09 UTC 2011 ssl.sh: #4237: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28459 at Tue Nov 8 16:20:09 UTC 2011 kill -USR1 28459 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28459 killed at Tue Nov 8 16:20:09 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:20:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28539 >/dev/null 2>/dev/null selfserv_9519 with PID 28539 found at Tue Nov 8 16:20:09 UTC 2011 selfserv_9519 with PID 28539 started at Tue Nov 8 16:20:09 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:09 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:20:09 UTC 2011 ssl.sh: #4238: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28539 at Tue Nov 8 16:20:09 UTC 2011 kill -USR1 28539 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28539 killed at Tue Nov 8 16:20:09 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:09 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:09 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28644 >/dev/null 2>/dev/null selfserv_9519 with PID 28644 found at Tue Nov 8 16:20:09 UTC 2011 selfserv_9519 with PID 28644 started at Tue Nov 8 16:20:09 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:09 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:20:10 UTC 2011 ssl.sh: #4239: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28644 at Tue Nov 8 16:20:10 UTC 2011 kill -USR1 28644 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28644 killed at Tue Nov 8 16:20:10 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:10 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:10 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28719 >/dev/null 2>/dev/null selfserv_9519 with PID 28719 found at Tue Nov 8 16:20:10 UTC 2011 selfserv_9519 with PID 28719 started at Tue Nov 8 16:20:10 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:10 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:20:12 UTC 2011 ssl.sh: #4240: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28719 at Tue Nov 8 16:20:12 UTC 2011 kill -USR1 28719 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28719 killed at Tue Nov 8 16:20:12 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28795 >/dev/null 2>/dev/null selfserv_9519 with PID 28795 found at Tue Nov 8 16:20:12 UTC 2011 selfserv_9519 with PID 28795 started at Tue Nov 8 16:20:12 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:12 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:20:12 UTC 2011 ssl.sh: #4241: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28795 at Tue Nov 8 16:20:12 UTC 2011 kill -USR1 28795 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28795 killed at Tue Nov 8 16:20:12 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28871 >/dev/null 2>/dev/null selfserv_9519 with PID 28871 found at Tue Nov 8 16:20:12 UTC 2011 selfserv_9519 with PID 28871 started at Tue Nov 8 16:20:12 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:12 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:20:12 UTC 2011 ssl.sh: #4242: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28871 at Tue Nov 8 16:20:12 UTC 2011 kill -USR1 28871 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28871 killed at Tue Nov 8 16:20:12 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:20:12 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:12 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 28947 >/dev/null 2>/dev/null selfserv_9519 with PID 28947 found at Tue Nov 8 16:20:12 UTC 2011 selfserv_9519 with PID 28947 started at Tue Nov 8 16:20:12 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:12 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:20:13 UTC 2011 ssl.sh: #4243: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 28947 at Tue Nov 8 16:20:13 UTC 2011 kill -USR1 28947 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 28947 killed at Tue Nov 8 16:20:13 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:20:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 29023 >/dev/null 2>/dev/null selfserv_9519 with PID 29023 found at Tue Nov 8 16:20:13 UTC 2011 selfserv_9519 with PID 29023 started at Tue Nov 8 16:20:13 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:13 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:20:13 UTC 2011 ssl.sh: #4244: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 29023 at Tue Nov 8 16:20:13 UTC 2011 kill -USR1 29023 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 29023 killed at Tue Nov 8 16:20:13 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:20:13 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:20:13 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 29099 >/dev/null 2>/dev/null selfserv_9519 with PID 29099 found at Tue Nov 8 16:20:13 UTC 2011 selfserv_9519 with PID 29099 started at Tue Nov 8 16:20:13 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:20:13 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:20:13 UTC 2011 ssl.sh: #4245: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 29099 at Tue Nov 8 16:20:13 UTC 2011 kill -USR1 29099 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 29099 killed at Tue Nov 8 16:20:13 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) TIMESTAMP ssl END: Tue Nov 8 16:20:14 UTC 2011 Running tests for merge TIMESTAMP merge BEGIN: Tue Nov 8 16:20:14 UTC 2011 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/tests.v3.18966 -t Test2 -f ../tests.pw merge.sh: #4246: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4247: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4248: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4249: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4250: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4251: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:12:05 2011 Not After : Tue Nov 08 16:12:05 2016 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:e2:f7:ed:b6:a5:02:29:26:96:c3:29:52:a9:e8:3a: a3:fb:1e:29:ad:99:60:ea:eb:1a:9a:f5:90:7b:f7:e5: 0f:ca:4f:a8:36:98:dc:95:ca:fe:0b:4f:1c:10:0f:6d: 9f:85:5a:ac:ac:0b:70:98:91:75:75:f7:dd:fc:d9:ae: 46:a8:c1:46:fa:4f:a5:aa:9a:4f:2e:ea:20:84:ec:0a: 33:71:1a:8d:f6:fa:73:58:46:67:48:86:db:52:61:78: 08:06:00:6f:bb:d5:77:c9:dd:80:a5:d9:ce:6a:e8:13: 3f:a9:90:60:fb:29:00:90:f8:b0:cb:2a:c2:21:5d:91 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0f:b9:49:f7:3a:38:ed:f4:50:00:7a:b8:15:4e:1d:97: 35:17:24:c3:94:aa:19:c8:aa:63:44:bc:13:95:6c:f2: a0:ce:18:c3:c5:1e:9e:d8:3b:7b:93:a3:7e:7d:00:b0: eb:37:0d:5d:3f:72:a9:35:ca:35:62:f7:7a:65:fb:2f: b7:78:d0:df:7d:17:b8:6f:75:94:fa:a8:9e:0b:db:f8: 07:46:ec:11:23:5f:70:69:1f:03:14:f6:3e:cb:e7:64: 52:18:dc:7f:c2:e9:e8:23:11:c6:6a:ea:51:12:d9:eb: c1:aa:53:78:0f:ae:d0:e4:a9:ba:b5:d6:d2:6b:79:2d Fingerprint (MD5): 0E:3D:C6:E8:62:AC:8A:13:3E:14:2F:31:23:8E:94:0B Fingerprint (SHA1): A3:F2:AB:CA:1D:7C:A2:E8:75:07:8A:A5:F3:D1:EF:66:E4:2A:8D:07 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4252: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:12:05 2011 Not After : Tue Nov 08 16:12:05 2016 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:e6:5c:16:bd:fd:d4:22:43:17:74:76:a7:75:d1:ff: d7:ee:97:ef:d7:2a:68:a0:39:92:c7:f7:ed:6b:8b:96: 7f:86:6f:3a:a7:1c:13:ae:14:2e:2a:53:a8:b6:74:bf: 91:b8:9a:a2:90:48:97:10:84:63:a5:ff:6a:85:2b:f2: 7e:f4:86:6e:da:90:53:28:f9:f5:d2:cd:fb:fa:20:ea: 13:9c:c4:44:4a:0c:99:83:41:4e:82:d4:a6:e9:bd:75: 58:0e:e2:76:c6:f9:ad:f7:25:63:7d:c4:44:c4:56:b7: 0c:01:ec:d0:de:b9:5f:80:80:6c:75:d6:97:9d:29:79 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b4:ff:70:74:99:35:f3:ef:8c:b0:9c:9b:51:70:84:9b: 45:6a:df:9e:85:65:4f:3a:ce:86:c9:8e:e6:48:ab:12: dd:d7:4e:41:b0:81:b3:27:70:ac:b2:ea:55:2a:58:14: d9:ce:1f:83:18:08:b3:4d:0f:70:f9:fc:da:a5:fb:f8: b2:13:0f:df:71:c1:e1:87:2a:44:9c:d8:00:98:7d:75: e3:4d:8a:0f:76:4b:01:5f:f0:fa:92:be:30:f5:7e:6b: aa:aa:0f:8e:4d:bb:42:34:bd:4b:13:64:55:52:c3:8a: 94:27:7d:a8:c1:08:ce:22:71:6d:c5:41:87:2b:5d:38 Fingerprint (MD5): 6B:93:32:46:C7:A7:CC:B1:D2:7C:5E:1F:0E:AC:52:92 Fingerprint (SHA1): 20:2C:C6:62:31:15:0D:4B:48:5A:E8:C2:74:B3:71:FF:DD:F4:C4:24 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #4253: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4254: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI Alice u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, TestCA CT,C,C localhost.localdomain u,u,u localhost-sni.localdomain u,u,u clientCA T,C,C chain-2-clientCA ,, ExtendedSSLUser u,u,u serverCA C,C,C chain-1-clientCA ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/tests.v3.18966 -t Test2 -f ../tests.pw merge.sh: #4255: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/upgradedb/tests.v1.18966 -t Test1 -f ../tests.pw merge.sh: #4256: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #4257: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #4258: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #4259: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Tue Nov 08 16:12:11 2011 Entry (1): Serial Number: 40 (0x28) Revocation Date: Tue Nov 08 16:11:53 2011 Entry Extensions: Name: CRL reason code Entry (2): Serial Number: 42 (0x2a) Revocation Date: Tue Nov 08 16:12:09 2011 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #4260: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Tue Nov 8 16:20:16 UTC 2011 merge.sh: Testing with shared library =============================== Running tests for cert TIMESTAMP cert BEGIN: Tue Nov 8 16:20:16 UTC 2011 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #4261: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #4262: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4263: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4264: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #4265: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #4266: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4267: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4268: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #4269: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4270: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #4271: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4272: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #4273: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #4274: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4275: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4276: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #4277: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4278: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #4279: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4280: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #4281: Exporting Root Cert - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #4282: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4283: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4284: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #4285: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #4286: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #4287: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert cert.sh: #4288: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #4289: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert cert.sh: #4290: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #4291: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4292: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4293: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #4294: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert cert.sh: #4295: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #4296: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert cert.sh: #4297: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #4298: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert cert.sh: #4299: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #4300: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4301: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #4302: Import Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4303: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #4304: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert cert.sh: #4305: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #4306: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4307: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #4308: Import Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4309: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #4310: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert cert.sh: #4311: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4312: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #4313: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert cert.sh: #4314: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #4315: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #4316: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4317: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #4318: Import Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4319: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #4320: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert cert.sh: #4321: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #4322: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4323: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #4324: Import Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4325: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #4326: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert cert.sh: #4327: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #4328: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4329: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #4330: Import Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4331: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #4332: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert cert.sh: #4333: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #4334: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4335: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #4336: Import Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4337: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com cert.sh: #4338: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert cert.sh: #4339: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #4340: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #4341: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #4342: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #4343: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #4344: Import Eve's cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #4345: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4346: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #4347: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... cert.sh: #4348: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #4349: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4350: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #4351: Import Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4352: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #4353: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert cert.sh: #4354: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:a4 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:36 2011 Not After : Wed Feb 08 16:20:36 2012 Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:7e:1c:f0:0e:5d:bd:f6:72:eb:aa:32:94:61:ed:79: 93:3b:b6:e6:90:d5:98:b0:c6:24:31:d9:b9:79:30:5c: 9f:b2:9f:31:30:3e:31:82:e6:9a:16:bb:33:2c:62:4d: ef:07:93:24:4e:32:95:7d:90:bd:f8:a5:43:23:3a:43: af:17:bf:72:16:f1:70:e7:84:40:38:a9:09:19:2a:f2: de:c4:7e:83:56:3c:40:62:9f:91:01:c9:84:ce:5a:a4: 83:4a:89:5d:d8:be:f0:78:0e:62:a6:d4:59:b1:dc:b5: db:84:de:a2:3e:4d:31:b3:96:5f:03:9d:fc:b6:ba:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6f:ec:30:97:1c:06:11:42:ff:89:d5:3b:b5:cd:79:d5: 1c:34:e8:ec:e9:57:07:38:d8:86:a3:eb:71:2a:2e:09: d0:71:7d:17:ce:44:05:a1:5c:5a:8c:42:5f:99:2a:ed: f0:e2:07:47:80:35:d9:ec:65:8e:35:3b:f8:e1:29:76: f4:16:87:57:28:b2:48:6a:98:59:9b:92:35:ed:5c:f2: fb:77:6a:47:18:72:10:4f:76:28:ff:5e:73:b7:96:ba: 34:6a:aa:aa:1d:1e:63:52:d0:8a:71:76:51:c6:a9:17: 60:61:d9:8d:c7:ed:01:46:a9:46:ea:5c:fb:bc:7e:af Fingerprint (MD5): 22:58:57:A5:65:A1:BB:61:8B:66:E3:A7:27:7B:03:17 Fingerprint (SHA1): 5A:88:A2:29:55:90:90:36:9B:01:AE:CB:3A:97:CD:6C:1C:BA:43:4F Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4355: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:a5 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:37 2011 Not After : Wed Feb 08 16:20:37 2012 Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:33:c8:5f:f0:e4:97:ce:30:6d:f1:ef:b8:c6:2f:56: 0e:7a:ce:6b:af:a4:54:59:0a:d2:55:11:f4:f4:7a:b4: a6:2b:8d:65:3c:06:06:ba:68:ea:d0:95:91:1d:0e:2b: 48:51:db:6a:f7:c0:60:b3:ef:0d:48:27:24:6b:6d:24: b2:0c:21:be:ba:7a:3d:49:63:81:d2:d1:b1:1e:90:32: 95:75:dc:1d:3d:7d:85:af:02:9c:2c:86:f2:23:1b:b7: 43:cd:f3:a3:e8:ef:22:27:4b:13:08:03:3e:82:e7:2f: 8d:50:55:b0:83:4b:69:1c:b3:d6:1e:ed:ad:a1:61:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4e:80:56:c0:ff:7d:14:0f:6e:11:e1:2c:fa:09:57:47: d1:a4:d7:a0:42:d4:ed:a7:61:8e:79:4d:a5:91:f6:41: fe:05:ad:ff:49:5d:69:82:bd:3f:83:db:bf:fc:a7:48: 05:f6:55:be:a8:22:66:a4:1d:38:bd:d3:07:3b:c5:76: a5:ca:12:3b:00:29:89:eb:42:75:d5:db:58:97:c8:f6: 77:14:34:8a:7a:4e:f1:75:70:49:0a:5d:8f:aa:22:0d: c7:64:6d:b2:d1:e2:8b:c7:97:4c:5f:ae:f9:64:82:50: 18:9e:a9:7b:54:54:89:f0:5f:3d:8a:0c:1b:e1:42:ff Fingerprint (MD5): 8F:ED:21:AF:4E:CA:A8:D7:E0:6E:C7:FF:F7:6A:10:F8 Fingerprint (SHA1): BC:31:D0:35:DC:0A:BF:CB:C0:7F:B4:9A:D4:DD:93:56:7F:8B:E2:E9 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4356: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:a7 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:37 2011 Not After : Wed Feb 08 16:20:37 2012 Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:78:ed:69:da:55:8d:56:60:c9:2f:41:2b:73:a2:3e: a2:f4:b1:b9:9c:c8:53:d3:2b:76:f0:63:56:e7:69:92: 9a:07:4b:87:aa:15:fe:8c:ac:53:d6:3c:8f:c0:32:ff: bc:c5:87:9c:0e:a2:12:23:a7:6e:70:28:be:08:b8:74: 7d:3b:5c:28:50:43:de:a9:02:9a:a5:64:3c:ef:f2:c9: 27:8a:ed:56:67:d6:ba:9b:5d:30:b1:a1:44:2a:81:f1: e3:b2:97:bd:19:61:df:9c:9d:51:1e:46:0f:1b:f8:ea: a9:ca:0b:2e:3c:96:ca:c7:52:99:27:8a:78:bc:00:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 18:43:ce:d7:4b:be:7d:f1:92:4b:55:52:5e:77:bd:c5: 41:a7:77:1f:18:ba:2f:99:39:e0:44:82:f3:5c:cd:fa: 93:8f:3b:32:e1:65:6e:6c:ce:2b:75:80:e2:21:1e:3e: 6c:de:0f:65:3c:c5:82:a6:d7:48:d2:b7:7e:0a:e5:9e: f5:0a:40:63:ec:2a:0c:99:db:a4:56:25:6c:e9:02:a6: 20:44:12:8e:8b:a5:73:7d:74:a8:90:33:86:2d:a1:56: 82:0a:d1:e0:35:a2:42:6e:fb:fd:c4:bb:8c:64:2a:67: 8e:be:70:f6:36:b4:bd:b8:81:69:7c:d9:31:bd:ed:b5 Fingerprint (MD5): 1F:56:70:8A:74:25:7E:3F:18:E2:F6:83:B0:48:5B:D5 Fingerprint (SHA1): 9C:62:6D:EE:95:37:EC:E4:5F:B5:12:F3:D6:A9:91:D0:DC:C5:0A:36 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4357: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:a8 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:38 2011 Not After : Wed Feb 08 16:20:38 2012 Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ef:77:b2:9d:70:52:90:43:c1:66:7b:20:de:34:66: 9d:16:d8:82:28:f2:7f:f3:d4:64:2b:08:4c:39:45:4f: 38:47:16:f6:16:2b:d6:7f:07:62:9f:04:e7:22:8a:2b: 32:ab:01:f9:f9:f4:6d:c4:85:0a:1d:a4:6c:79:13:68: 5c:d2:fc:71:1f:b9:9a:04:33:71:bc:28:65:20:05:a1: f5:71:c5:73:d6:3b:29:d7:2f:17:54:78:ea:7f:0f:68: 89:95:b4:78:74:33:d0:e7:5c:c8:fe:11:47:9c:91:ae: e1:09:4b:3c:71:ac:79:66:b9:54:24:9a:cb:8d:d2:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 97:f7:f2:92:ac:e3:b6:1a:84:cd:2d:8a:3b:ae:f9:04: 3f:b8:19:a5:c9:01:83:cb:f8:f9:fd:18:95:e8:b2:cd: 91:29:e9:3c:21:2a:78:79:cf:54:25:0c:5f:5b:b2:f0: c1:77:25:bd:81:5e:e5:cf:e6:98:aa:62:82:b9:1e:19: 5d:e8:65:5b:42:1b:69:2a:4b:5f:cf:a2:7c:7b:79:7a: e8:b5:97:a0:e8:88:34:9c:26:7a:0b:03:fb:ae:b5:7f: 40:a6:1d:87:b4:0f:8b:cf:7c:24:c5:ed:1d:75:86:8f: bd:9d:50:87:05:d9:d8:91:cb:98:72:12:a0:63:51:f4 Fingerprint (MD5): 06:BB:AD:C6:2F:C5:A2:7F:7E:F6:23:85:D2:9D:E8:39 Fingerprint (SHA1): CF:18:5A:47:95:A9:7E:24:BC:F9:A7:3E:27:7A:07:3A:1A:3A:22:86 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4358: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:aa Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:39 2011 Not After : Wed Feb 08 16:20:39 2012 Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:1b:24:1c:b4:eb:72:7b:5a:23:6f:60:b9:0e:be:fc: 2d:f0:35:af:69:a3:b4:20:c2:d0:52:8a:0d:6f:81:8f: 2d:d3:d0:c7:82:56:41:85:30:c7:54:e8:18:9f:2c:f4: d5:89:e6:a7:9c:a2:56:61:40:d5:5c:28:e5:7e:f4:94: 00:89:a6:bb:30:ee:5c:09:f4:03:01:bf:3e:6f:e6:aa: e4:82:ec:8c:69:e0:90:10:6d:f8:74:56:69:87:02:c4: 11:61:84:64:a5:4b:2b:0a:8b:aa:04:34:3f:a8:4e:43: 74:30:63:82:69:e7:5f:94:f9:89:09:c4:9c:a1:54:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 76:7a:78:83:48:3d:f4:42:d9:a4:fe:62:e3:8d:4d:31: a1:e7:77:d1:2b:2f:43:62:44:a5:96:8d:bc:f2:ce:33: 6b:83:a5:7f:ca:a8:5c:9f:41:30:10:58:7d:4a:9e:86: d6:af:5e:cd:5d:4a:78:f0:5b:e4:5c:f2:11:53:dd:77: df:1e:19:72:f0:93:41:a3:08:63:c2:f7:84:11:78:94: 9f:2f:89:23:e7:ed:76:31:d2:14:f7:cc:b2:3e:78:21: 65:ff:0d:e2:7e:d7:24:60:18:c7:b5:dc:a2:7b:a9:bb: 63:df:38:34:ac:6b:a5:45:c7:69:18:16:a5:39:7a:ef Fingerprint (MD5): 69:6E:E6:E9:02:90:48:1B:3E:A7:A7:02:FB:B0:BA:16 Fingerprint (SHA1): 45:49:5E:17:57:78:40:6A:3B:EE:A7:87:E3:30:84:18:EA:3D:91:CE Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4359: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:ac Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:40 2011 Not After : Wed Feb 08 16:20:40 2012 Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:36:41:e8:1f:7d:b8:c3:0a:d6:20:b1:79:45:49:35: 5b:b9:0f:01:56:85:f2:4c:23:67:84:a6:aa:67:71:93: 67:2b:21:b9:ee:f0:a6:39:3b:8f:8a:b6:12:4d:19:4d: 0f:66:56:76:e4:3f:db:c5:36:cd:67:c7:3c:ce:d2:9b: 5e:2d:76:43:34:e7:2c:da:00:c7:d0:68:22:94:66:59: 6e:a2:57:16:67:ff:e9:d2:31:96:f5:cc:8a:be:41:30: 99:bb:61:30:d4:2a:c9:7b:6d:6b:85:e3:f9:6e:ab:47: ce:c9:b2:a6:62:1d:f1:e3:64:d7:59:8d:06:c2:6b:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 36:c3:b4:20:26:77:76:c9:c8:50:7f:53:e3:00:da:6d: 44:43:e0:6b:b8:df:f8:3f:9e:a7:e0:c2:60:46:ba:fe: 20:3a:f8:f1:bd:99:5c:30:f4:1b:54:30:cf:4f:d5:35: e9:3b:5c:3f:59:a7:e6:f9:48:30:cb:0a:a3:b7:eb:aa: dc:15:d3:72:e9:c9:24:5a:cf:05:7e:17:ff:fc:33:b7: 53:15:bd:1e:ae:4d:16:54:e8:5a:08:7f:02:5c:7b:79: c9:a5:4f:bb:24:03:e2:82:4f:ab:64:49:d4:c1:57:9d: ad:f7:63:04:bc:40:79:7a:cc:95:eb:07:d2:e6:6c:68 Fingerprint (MD5): 35:A1:AE:C4:88:70:DD:51:4E:1A:44:48:3A:14:92:0F Fingerprint (SHA1): BF:35:B1:6F:B2:D2:EA:40:3A:D0:9F:29:D9:F4:82:50:10:2F:EC:85 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4360: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:ad Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:41 2011 Not After : Wed Feb 08 16:20:41 2012 Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:52:0d:9d:b4:c2:01:85:d7:8e:69:3c:64:3c:40:7c: e0:d2:57:b7:7c:59:d8:a5:15:ab:60:7d:31:40:ac:72: 77:b8:61:1b:51:2d:b4:ae:6d:ac:8d:1d:d7:63:8f:df: 11:3d:91:8a:5c:53:c8:51:20:39:df:8e:d8:fe:16:fb: 6c:20:9f:98:4e:bd:42:81:d8:d4:5d:ff:67:27:6b:3a: 03:d1:9a:a6:f9:2e:f4:24:27:47:f4:ab:60:f4:11:1c: 00:6c:00:8b:e7:8f:e3:bb:14:28:37:3c:0b:5c:17:16: 0c:b3:ab:cd:a9:c0:a8:40:88:e7:83:df:ca:30:0d:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 4c:f2:d7:90:1d:65:48:1e:10:bd:74:0b:75:03:65:65: 2f:10:ac:a3:d5:4f:b8:ab:68:78:f1:32:b1:cd:5e:24: 83:b9:41:bd:06:39:f7:10:19:ae:c9:ac:1c:85:17:0d: 3b:84:bd:e8:57:8a:dc:2e:a0:f8:74:7d:f6:f4:80:54: b6:4c:0d:9d:67:e2:0d:41:8d:af:88:f9:2a:6e:fb:8d: c0:ac:c4:2e:a0:fa:6c:c8:e0:be:b0:e5:41:88:a5:36: 34:39:2c:17:b4:a6:15:fc:c0:da:90:35:56:13:d0:d4: 3c:f8:ef:9a:38:7d:4a:36:1c:9c:02:4c:d5:0a:88:1e Fingerprint (MD5): FA:E6:44:84:41:4D:4D:ED:B0:98:2A:A1:F4:03:74:96 Fingerprint (SHA1): 85:CF:4F:A1:AA:D8:AA:DA:2B:2A:5C:72:09:16:C0:38:AF:31:B1:31 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4361: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:af Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:42 2011 Not After : Wed Feb 08 16:20:42 2012 Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:12:58:ec:22:39:8a:53:ef:43:67:57:6c:76:bd:10: 73:52:66:31:3c:72:b9:46:05:bc:10:ef:84:6b:13:e4: 20:5d:49:08:f3:fb:17:e7:c2:6d:44:18:2e:f1:a6:d2: 0a:82:cc:44:44:77:61:64:ca:0b:a6:92:de:c3:9b:c9: 91:5b:a0:5f:6a:21:1a:5c:72:81:7b:92:4b:82:a8:60: d5:17:43:3d:41:f8:9e:94:6c:79:3f:5e:4e:73:ad:b8: df:54:fd:98:83:f8:0d:10:7c:18:6a:cb:cf:f8:23:77: fc:b7:54:14:09:31:21:0d:90:e0:1f:f2:5e:0f:99:61 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3a:48:ec:59:9c:f1:4b:6a:12:a4:e2:ec:d0:e8:ea:36: 43:fa:c6:9c:6c:6f:e9:d9:38:cf:1f:15:71:06:50:cb: 82:a9:00:35:f4:81:67:c0:c8:60:3e:2e:2e:2d:c3:4d: 23:64:c0:f1:f0:3d:91:3d:cf:b8:cd:8b:ab:7f:61:7c: 71:3f:9d:c9:2e:52:11:ac:62:df:9c:b1:13:3a:f9:26: d9:8e:5e:eb:53:6f:7b:11:af:16:40:32:71:4a:b5:bb: d7:43:7d:2a:cf:c4:54:60:e4:9a:f0:8a:09:45:2e:fd: 16:75:af:6d:48:b6:7c:87:f2:47:87:ad:e2:0e:9f:e2 Fingerprint (MD5): 7B:87:81:F0:2F:5F:A7:B0:1A:92:04:8E:A6:B6:94:5B Fingerprint (SHA1): 5B:D9:4B:C7:95:41:04:EE:3B:31:E8:F2:F4:54:3A:FE:41:69:86:A7 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4362: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:b0 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:43 2011 Not After : Wed Feb 08 16:20:43 2012 Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie w,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:ce:91:cb:a3:0e:9d:3f:ac:0c:32:27:87:00:4b:14: c9:b8:ca:3c:cd:57:3f:c6:61:ee:7d:fe:70:53:ab:b4: b8:9e:99:22:1e:02:aa:26:84:4a:35:4d:b3:7b:9b:8a: af:1d:6c:25:af:05:ae:ce:e7:d4:31:92:8e:7d:d9:00: 64:8a:2f:7c:41:84:77:c7:20:ca:d0:b9:81:7e:b6:eb: 41:3d:86:35:aa:9e:66:85:3b:4e:9d:12:f3:ee:50:2f: 6b:f4:91:27:1e:b8:11:1e:10:7c:31:c5:68:3b:5e:c1: 15:32:71:13:46:f6:3a:e9:26:60:d4:43:25:1b:d2:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 89:c1:ec:41:c6:5c:2a:ae:1f:87:11:5f:4c:b2:3c:1c: 66:c4:b2:e8:c2:ad:f1:f5:c5:f2:3a:e3:5f:46:b0:e8: 1c:c5:11:e9:e7:73:66:97:c3:0e:03:2f:71:71:60:80: 0b:8c:34:06:d0:39:ab:71:61:d7:4e:2b:79:0c:c1:44: 20:20:07:74:ff:48:b7:38:82:85:82:13:35:bb:1c:70: 29:2b:1a:c3:f4:bb:de:7f:3c:e2:20:b3:5e:72:2b:d4: 66:6e:45:c2:c6:9c:dd:dd:aa:19:34:88:16:05:a8:b6: 6a:12:a4:67:cf:08:62:81:05:3c:13:f6:32:07:b3:18 Fingerprint (MD5): DA:9F:B4:DE:2C:26:9E:6D:8A:52:AE:9A:CF:10:E1:44 Fingerprint (SHA1): 21:3D:78:F6:AE:1E:D1:79:54:27:B0:EE:D8:3D:08:15:94:6B:B6:05 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4363: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:b2 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:43 2011 Not After : Wed Feb 08 16:20:43 2012 Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:b1:2b:fb:39:40:67:b3:71:d1:31:23:64:c7:61:b5: a0:9f:fa:87:27:d9:df:a5:09:7b:5f:05:9d:cc:4d:64: ea:ca:58:ed:54:2c:bc:c9:9e:64:db:e2:f7:e4:d3:63: 17:dd:b5:f7:48:f0:22:d2:3e:a8:3c:00:e1:be:22:15: df:ab:5e:43:56:c8:52:0c:2a:7e:cc:15:b5:16:c2:bd: 6f:5d:ca:35:ac:b2:f7:ba:c7:3a:99:61:4a:f6:5c:08: c4:dd:27:00:ff:19:1c:87:47:29:85:db:69:49:13:05: 3e:14:d2:66:ed:b2:39:24:8d:8c:c2:b7:9a:b9:93:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 68:52:14:9d:5e:5e:9f:dd:cd:00:7c:fb:d4:1b:33:1e: f7:63:99:03:9e:48:ed:cb:e3:81:7a:5e:98:47:ce:65: a9:cc:0a:71:d1:72:4a:7a:43:13:5f:65:fc:f6:a6:71: dd:bd:a9:13:52:a3:c9:c1:c2:68:90:48:b4:7b:19:a7: 79:bc:73:ad:cd:a3:0d:3e:a3:78:34:2f:ae:b2:4f:51: b3:18:de:48:7a:c6:b1:7e:90:f1:a7:6d:8d:3f:c1:bb: 28:35:3e:d6:69:49:14:13:ad:08:3b:62:4b:16:23:40: 6e:20:6c:e0:83:b7:86:9a:b1:0e:43:78:38:36:1b:29 Fingerprint (MD5): C4:05:AB:01:D8:D3:B1:99:69:8E:3A:A3:EC:8B:73:A9 Fingerprint (SHA1): 3D:97:83:BF:34:F3:27:E8:41:A2:4B:9C:92:49:85:23:27:E4:C2:A5 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4364: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:96:27:71:b3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Tue Nov 08 16:20:44 2011 Not After : Wed Feb 08 16:20:44 2012 Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:46:e7:92:a9:56:1f:2f:74:68:a2:1e:53:59:8d:20: 73:4a:45:28:55:67:88:71:8c:14:8a:91:c2:11:d5:51: 85:3c:00:dc:54:79:f3:92:4b:ac:89:99:16:5b:c0:92: f8:53:b5:d2:d7:5a:70:b9:39:de:55:57:f3:68:c8:7e: 87:28:38:f0:64:3b:25:bb:f4:b3:85:4e:14:19:ee:9e: 91:c7:4f:05:35:32:b7:0c:97:fc:22:2e:c7:52:16:60: 30:0c:09:d7:ef:97:b2:b9:ab:41:9f:8f:8a:8a:66:1a: 18:72:bb:b7:f2:8a:67:0c:de:32:c3:ee:be:c4:1e:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7a:e8:a0:05:5b:80:68:4f:c7:fe:c1:24:40:89:da:22: f0:54:de:7f:6d:99:c2:f4:d6:f3:69:01:b8:2a:5e:2e: 6e:9d:d5:67:94:09:f4:37:89:4e:05:93:b3:dc:ba:7e: af:5f:79:2b:7b:56:2a:3d:fe:da:38:8d:9e:04:46:17: 16:a3:cd:ae:b7:cc:62:f6:1e:7e:20:ec:91:1e:c4:07: 5e:3c:a3:1f:70:bd:01:cf:21:ac:e7:25:77:91:bf:dd: 5b:3d:86:41:9f:50:fa:85:e3:ed:4d:e9:a9:40:fb:68: d5:9b:3f:f2:39:21:16:8d:a9:30:89:20:35:e8:0b:6c Fingerprint (MD5): 68:55:27:1C:04:22:59:09:91:EF:57:83:47:C0:38:CA Fingerprint (SHA1): DD:2C:6F:AD:36:1D:3D:4A:5D:ED:A0:AF:C0:DA:2D:4F:5B:6B:C1:17 Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #4365: Certificate Key Usage Extension (11) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #4366: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4367: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4368: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #4369: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #4370: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... cert.sh: #4371: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #4372: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #4373: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #4374: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #4375: Import Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4376: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #4377: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert cert.sh: #4378: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #4379: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #4380: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #4381: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #4382: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4383: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: `./req' and `/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #4384: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert cert.sh: #4385: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4386: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4387: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4388: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #4389: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4390: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4391: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4392: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4393: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4394: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4395: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #4396: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #4397: Verify Distrusted Cert for Object Signer - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4398: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #4399: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert cert.sh: #4400: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4401: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #4402: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert cert.sh: #4403: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4404: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #4405: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert cert.sh: #4406: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4407: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #4408: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert cert.sh: #4409: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4410: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #4411: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert cert.sh: #4412: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4413: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #4414: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert cert.sh: #4415: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4416: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #4417: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert cert.sh: #4418: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4419: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #4420: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert cert.sh: #4421: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4422: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #4423: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert cert.sh: #4424: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4425: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #4426: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert cert.sh: #4427: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4428: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #4429: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert cert.sh: #4430: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4431: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #4432: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert cert.sh: #4433: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #4434: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #4435: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert cert.sh: #4436: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #4437: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #4438: Modify CRL by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #4439: Modify CRL by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #4440: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #4441: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: No matching CRL was found. cert.sh: #4442: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #4443: Importing CRL for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Tue Nov 8 16:21:07 UTC 2011 Running tests for dbtests TIMESTAMP dbtests BEGIN: Tue Nov 8 16:21:07 UTC 2011 ./dbtests.sh: line 206: syntax error near unexpected token `then' ./dbtests.sh: line 206: ` if [[ $EUID -ne 0 ]] then' TIMESTAMP dbtests END: Tue Nov 8 16:21:07 UTC 2011 Running tests for tools TIMESTAMP tools BEGIN: Tue Nov 8 16:21:07 UTC 2011 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4444: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7f:5d:f0:a2:25:de:91:f0:0a:42:af:d0:f5:b0:75:c1 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4445: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4446: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4447: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 87:3c:94:ea:78:ab:5d:40:90:3b:dd:de:fa:d5:67:db Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4448: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4449: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4450: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: b1:d0:9d:5e:4f:8a:df:c9:ae:bf:a0:f4:4b:44:d0:40 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4451: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4452: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4453: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 48:1b:3b:da:6c:4d:25:e8:37:86:93:2a:e2:87:4a:d6 Iteration Count: 1 (0x1) tools.sh: #4454: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4455: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4456: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a5:ef:f8:e7:73:58:df:0b:76:ce:49:42:ef:28:8a:f9 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4457: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4458: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4459: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1b:ce:82:5e:d4:46:6b:b0:01:31:c6:1f:32:2a:1c:b8 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4460: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4461: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4462: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f7:9c:43:e1:a0:99:9a:42:ca:4f:46:37:ec:b8:e9:76 Iteration Count: 1 (0x1) tools.sh: #4463: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4464: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4465: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c3:de:e5:5a:c1:65:ba:5d:fc:e1:de:3a:42:df:26:64 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:2e:7d:04:31:24:2a:31:1a:f6:94:45:95:31:6e: 96:b9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4466: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4467: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4468: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 60:57:b4:37:54:6d:e9:ab:85:d1:e1:92:5b:97:a3:56 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:42:f3:a5:0c:c9:5f:21:70:ad:8c:7c:79:c4:fd: 71:9f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4469: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4470: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4471: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c3:fe:55:41:78:cf:f7:fa:ad:0b:7b:e0:42:8d:c8:cc Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-128-CBC Args: 04:10:27:76:fa:44:1c:ab:79:d3:cb:18:74:30:5b:26: b1:f7 tools.sh: #4472: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4473: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4474: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e9:1d:41:53:ce:ee:26:72:b0:66:d8:57:e8:90:d2:fb Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:b3:b6:43:34:2a:df:52:fd:8a:3e:a3:3f:de:e6: f4:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4475: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4476: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4477: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ac:1a:e5:e4:3b:15:f7:9a:9c:fe:24:bb:4a:52:a8:22 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:36:fe:bf:b6:41:69:c7:af:1a:96:11:3b:8c:93: 59:47 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4478: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4479: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4480: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 39:9d:67:bb:1f:a1:2f:cc:5c:6e:e4:c4:cb:c4:82:bf Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-192-CBC Args: 04:10:36:01:5a:89:f7:a4:91:da:da:ce:f5:0a:1e:e5: 58:d9 tools.sh: #4481: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4482: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4483: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 27:27:17:87:ce:8c:0e:76:ad:3d:bd:4a:6b:b1:14:35 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:99:1b:c8:6f:64:e9:50:bb:7c:7e:5b:28:8a:cb: 38:c0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4484: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4485: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4486: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:11:98:74:55:56:90:4e:35:84:f4:3f:81:f4:9b:e4 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1e:ad:f9:50:d7:f2:77:df:de:9e:45:d4:f6:60: 9d:cb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4487: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4488: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4489: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3e:97:5d:05:6f:d2:d1:65:4e:02:2d:52:30:c2:41:ee Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f4:fc:4d:56:55:1b:9d:bd:5d:98:ca:cc:ec:ca: 0f:40 tools.sh: #4490: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4491: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4492: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d5:51:c1:1f:e9:e7:3c:30:2d:6a:a6:09:1b:75:f9:86 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:37:07:c5:62:6e:28:70:41:10:88:33:1a:9f:2c: 4b:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4493: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4494: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4495: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b1:38:e4:96:3d:fe:a0:97:30:05:7f:cf:a3:20:39:c6 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:4b:c6:ef:4c:c9:f9:08:c2:a3:de:98:52:47:8f: 11:d7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4496: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4497: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4498: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c6:e4:8e:dd:1b:ab:56:b6:4f:d7:93:9e:83:39:4b:15 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-128-CBC Args: 04:10:96:b3:27:b1:a8:b5:47:e4:56:5b:95:4c:8d:44: 0d:9e tools.sh: #4499: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4500: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4501: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 18:d2:56:a5:cb:bd:a8:73:6f:fd:a2:cb:f0:5a:53:65 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:65:34:e2:87:ba:5a:52:8e:9a:7f:5b:4e:49:1e: 87:e8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4502: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4503: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4504: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 90:61:f5:5d:a3:b4:5f:c9:34:54:ae:e0:14:19:b5:ac Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:5a:b5:23:98:fb:ae:31:07:ba:9f:ee:89:ce:b0: ba:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4505: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4506: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4507: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ce:8d:89:7b:8e:c9:15:5c:6a:d0:d3:e4:85:ee:6c:f7 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-192-CBC Args: 04:10:3a:f4:7c:9c:36:e2:fc:54:68:c9:ff:40:e8:b1: 00:b4 tools.sh: #4508: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4509: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4510: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ff:20:a3:a6:4b:8c:e4:d2:46:ca:44:ab:f3:c1:83:da Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:76:d4:a2:4c:de:31:ea:5f:c7:dc:98:f0:06:9c: 31:90 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4511: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4512: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4513: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:02:f2:5b:ae:44:4f:96:80:c4:f3:a3:ab:44:9b:a7 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:87:3d:12:20:85:68:ce:a1:54:31:b0:c3:b5:8e: 72:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4514: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4515: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4516: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d7:68:1d:4b:eb:db:d8:59:f6:00:92:2b:48:06:52:63 Iteration Count: 1 (0x1) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: CAMELLIA-256-CBC Args: 04:10:01:77:5f:94:29:a8:5a:bb:c0:d9:c5:ab:91:24: eb:0e tools.sh: #4517: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4518: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4519: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 56:39:86:17:7d:8c:c0:d8:fa:19:24:1b:a9:b8:b6:bc Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4520: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4521: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4522: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 2b:52:f2:a9:f6:e4:2e:79:b3:1d:37:fe:75:d6:0e:82 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4523: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4524: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4525: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 4f:f7:b3:3d:bc:9a:20:cb:e5:65:06:52:5f:b0:c0:ad Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4526: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4527: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4528: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ff:5b:da:2f:ff:9e:d1:b5:7e:ee:33:4c:f9:21:da:4c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4529: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4530: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4531: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 94:d2:03:0f:65:94:57:89:07:98:fd:98:28:b5:65:cd Iteration Count: 1 (0x1) tools.sh: #4532: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4533: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4534: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c4:c9:fc:d4:aa:93:ad:40:1c:ac:83:6b:05:e4:e0:fd Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4535: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4536: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4537: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 39:02:9e:71:de:e6:a9:18:3d:8e:33:6b:24:d7:e5:fa Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4538: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4539: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4540: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 3f:6c:2d:33:44:3a:5b:84:86:4e:79:ff:e5:35:64:49 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4541: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4542: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4543: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e4:a5:28:f0:85:ac:af:fc:2e:cd:06:d3:bc:4e:9e:ca Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4544: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4545: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4546: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 91:e6:7f:a7:ea:9a:69:19:17:0d:b9:c9:11:e3:d3:58 Iteration Count: 1 (0x1) tools.sh: #4547: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4548: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7b:28:ae:1a:78:ad:b5:6a:2e:a9:5c:4a:59:fa:29:6b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4550: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4551: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4552: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e2:ce:ee:84:cd:3b:3f:97:5a:84:14:a6:b3:1c:4d:56 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4553: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4554: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4555: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 04:c1:e0:35:56:47:3b:20:df:47:c5:76:3b:cb:8e:8a Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4556: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4557: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4558: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 26:a7:33:17:e5:bf:d9:a6:2b:c3:bc:33:e8:dd:6d:0b Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4559: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4560: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4561: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 43:23:f1:89:92:e2:d7:63:b7:b7:24:c9:eb:3d:f3:51 Iteration Count: 1 (0x1) tools.sh: #4562: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4563: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4564: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4c:f7:3e:a9:b5:c5:79:7e:ee:39:2c:d3:2a:28:be:de Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4565: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4566: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4567: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8c:98:d6:31:22:b6:7a:eb:0c:a4:e9:5f:7c:f7:72:32 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4568: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4569: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4570: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f4:93:e2:c7:d5:91:8e:d5:93:73:f9:9c:ee:f6:cc:69 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4571: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4572: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4573: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7e:c6:bd:5e:22:99:22:b2:cf:4c:91:62:84:61:33:a5 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4574: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4575: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting with [default:null] pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4576: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d8:c2:19:6f:e6:34:68:3b:af:f6:2f:a7:ff:64:e9:78 Iteration Count: 1 (0x1) tools.sh: #4577: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4578: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4579: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1d:4c:6d:46:bb:63:4a:08:23:a5:aa:c4:e3:d5:3c:30 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4580: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4581: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4582: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f8:37:fd:5f:58:5f:c7:cd:a7:05:f1:95:d6:ce:06:5c Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4583: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4584: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4585: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cb:94:5d:af:00:d9:69:f5:f7:63:d9:01:57:ee:98:58 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4586: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4587: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4588: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 32:d7:f2:d8:d8:29:17:6a:27:9a:5a:18:9b:8a:58:ac Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4589: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4590: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4591: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ce:e4:bd:78:ca:6e:5e:70:9f:ad:1c:50:fd:59:d1:e9 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4592: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4593: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4594: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 35:2b:1f:a0:cd:94:ea:5f:10:cc:b0:67:8e:5e:0a:f8 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4595: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4596: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4597: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b3:b6:c5:1a:0a:0b:01:f2:0f:6f:33:85:1b:b0:06:c6 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4598: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4599: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4600: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:9a:a4:c6:cd:92:10:97:1d:bd:c1:f8:1f:23:8e:1d Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4601: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4602: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4603: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 68:22:54:ce:cc:4c:e0:4b:85:35:20:06:68:4b:40:eb Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4604: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4605: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o) pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4606: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 14:c4:29:d5:bf:8f:92:01:65:e0:ca:3b:35:0f:92:d1 Iteration Count: 1 (0x1) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:17 2011 Not After : Tue Nov 08 16:20:17 2061 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:38:fb:d7:83:cb:9f:54:eb:36:44:2b:c2:a4:25:71: a3:43:99:2a:21:87:08:74:dd:b4:e9:3a:f9:2f:b0:8d: 77:2d:4f:70:5a:33:58:68:91:0d:cf:e2:92:30:65:0e: 61:b2:0e:57:3f:02:ac:ae:c3:df:d9:23:5f:f3:4a:01: ab:db:24:16:d5:d9:b6:51:8e:a1:88:75:40:e6:20:22: 96:11:d3:bc:8f:a5:01:2c:bc:81:43:73:f2:1d:c0:0e: 9f:72:db:b7:72:fc:2a:14:76:ed:97:95:96:b3:36:22: f6:28:c1:8a:96:a6:11:32:3f:c3:76:61:6b:d8:72:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 54:f7:58:92:f3:e8:83:2f:f3:20:70:ea:fe:32:5f:ad: 3e:d6:8e:d6:20:79:eb:ff:31:92:fe:75:98:dd:83:97: b7:12:98:4f:15:48:8a:ba:cc:95:52:2e:36:b0:3d:98: 35:cd:0b:57:b2:fb:09:32:31:42:98:33:2f:c3:a4:c9: 9d:4d:c7:d2:c2:88:89:3a:d7:cf:23:58:7e:74:49:4d: ad:af:75:a1:93:b7:e0:17:48:c0:0a:d5:91:6d:5f:76: 48:78:26:83:b0:3a:51:df:e5:d9:a9:44:e4:07:2f:bf: 9c:92:ed:62:0a:cb:40:7a:d0:c6:72:ee:75:61:07:1a Fingerprint (MD5): C1:7D:5F:41:34:F6:EB:DB:45:AF:55:36:9C:13:A8:02 Fingerprint (SHA1): FA:DF:FD:36:81:A4:FE:C4:58:52:3D:CE:74:CF:07:99:86:8A:08:B8 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:29 2011 Not After : Tue Nov 08 16:20:29 2016 Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C alifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:9c:29:3c:cd:2d:93:a0:a1:68:2a:40:d3:e4:4b:83: 9f:82:0e:6d:e6:45:83:29:26:7d:21:8f:c3:79:b5:2d: 31:13:28:6b:28:66:26:54:d9:dc:16:c3:28:8b:35:d9: c0:9a:34:89:11:45:59:b7:46:a6:04:ce:a6:a6:e4:66: 02:a4:c2:36:41:44:05:25:f9:98:b4:f3:25:01:5a:13: ed:29:aa:c0:1b:21:e7:f1:4b:b1:80:7a:66:bd:67:2b: 96:96:a1:4e:c4:6e:75:73:7c:87:9c:61:25:cd:86:8a: 8b:97:67:61:0a:ff:f1:c2:e4:ec:24:27:ff:b4:10:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:4a:fd:4c:3a:99:97:a4:ed:51:9a:44:cc:08:2d:cc: 08:66:0e:e1:10:03:3a:f4:fd:cc:5e:73:6d:8a:26:d8: e5:56:66:b4:23:0b:6b:d8:52:76:1b:38:25:62:eb:a8: 91:84:4d:91:9b:23:a1:4e:64:d3:a1:78:60:93:8f:8d: 75:e7:5c:df:66:14:80:88:d6:ab:e7:c8:67:fc:02:a6: 6a:ad:04:4a:4a:ca:a3:8e:f5:09:8c:e9:43:75:b8:61: 13:a0:2a:a0:11:f1:90:79:1f:25:da:18:29:99:1f:5a: a4:40:91:f4:84:df:77:d8:28:96:76:88:33:21:45:7d Fingerprint (MD5): A9:2B:AD:30:F2:47:AD:EA:70:83:66:64:AF:E1:5A:F2 Fingerprint (SHA1): 12:8A:8F:C1:C0:BD:D8:C0:BD:ED:9E:C5:45:78:D2:5C:AA:86:34:C7 Friendly Name: Alice tools.sh: #4607: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4608: Importing Alice.p12 (pk12util -i) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c null pk12util: Algorithm: "null": security library: invalid algorithm. tools.sh: #4609: Exporting with [null:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C null pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #4610: Exporting with [default:null] (pk12util -o) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #4611: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 55%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #4612: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #4613: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #4614: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> signjs.html --> sign.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 54%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 55%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #4615: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified signjs.html verified sign.html tools.sh: #4616: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #4617: Show who signed xpi (signtool -w) - PASSED TIMESTAMP tools END: Tue Nov 8 16:21:27 UTC 2011 Running tests for fips TIMESTAMP fips BEGIN: Tue Nov 8 16:21:27 UTC 2011 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB 2. RootCerts library name: /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token ----------------------------------------------------------- FIPS mode enabled. fips.sh: #4618: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #4619: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa c462e5510a9724f4deb59a98f5eb7be0ac853e3c NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #4620: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect. fips.sh: #4621: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #4622: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #4623: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #4624: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #4625: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #4626: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #4627: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #4628: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #4629: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #4630: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa c462e5510a9724f4deb59a98f5eb7be0ac853e3c FIPS_PUB_140_Test_Certificate fips.sh: #4631: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #4632: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #4633: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #4634: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #4635: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa c462e5510a9724f4deb59a98f5eb7be0ac853e3c FIPS_PUB_140_Test_Certificate fips.sh: #4636: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 106. **** **** ALL TESTS PASSED **** fips.sh: #4637: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 104. **** **** ALL TESTS PASSED **** fips.sh: #4638: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdbm3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspem.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.13.1/mozilla/dist/Linux2.6_x86_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x000d7caf (883887): from 49 (73) to 69 (105) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #4639: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Tue Nov 8 16:21:41 UTC 2011 Running tests for crmf TIMESTAMP crmf BEGIN: Tue Nov 8 16:21:41 UTC 2011 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #4640: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #4641: CMMF test . - PASSED TIMESTAMP crmf END: Tue Nov 8 16:21:41 UTC 2011 Running tests for smime TIMESTAMP smime BEGIN: Tue Nov 8 16:21:41 UTC 2011 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {SHA1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #4642: Create Detached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4643: Verifying Alice's Detached Signature (SHA1) . - PASSED smime.sh: Signing Attached Message (SHA1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #4644: Create Attached Signature Alice (SHA1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1 smime.sh: #4645: Decode Alice's Attached Signature (SHA1) . - PASSED diff alice.txt alice.data.SHA1 smime.sh: #4646: Compare Attached Signed Data and Original (SHA1) . - PASSED smime.sh: Signing Detached Message {SHA256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #4647: Create Detached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4648: Verifying Alice's Detached Signature (SHA256) . - PASSED smime.sh: Signing Attached Message (SHA256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #4649: Create Attached Signature Alice (SHA256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256 smime.sh: #4650: Decode Alice's Attached Signature (SHA256) . - PASSED diff alice.txt alice.data.SHA256 smime.sh: #4651: Compare Attached Signed Data and Original (SHA256) . - PASSED smime.sh: Signing Detached Message {SHA384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #4652: Create Detached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4653: Verifying Alice's Detached Signature (SHA384) . - PASSED smime.sh: Signing Attached Message (SHA384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #4654: Create Attached Signature Alice (SHA384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384 smime.sh: #4655: Decode Alice's Attached Signature (SHA384) . - PASSED diff alice.txt alice.data.SHA384 smime.sh: #4656: Compare Attached Signed Data and Original (SHA384) . - PASSED smime.sh: Signing Detached Message {SHA512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #4657: Create Detached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. smime.sh: #4658: Verifying Alice's Detached Signature (SHA512) . - PASSED smime.sh: Signing Attached Message (SHA512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #4659: Create Attached Signature Alice (SHA512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512 smime.sh: #4660: Decode Alice's Attached Signature (SHA512) . - PASSED diff alice.txt alice.data.SHA512 smime.sh: #4661: Compare Attached Signed Data and Original (SHA512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #4662: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #4663: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #4664: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@bogus.com,dave@bogus.com smime.sh: #4665: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@bogus.net smime.sh: #4666: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #4667: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #4668: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #4669: Decrypt with a Multiple Email cert . - PASSED smime.sh: #4670: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #4671: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #4672: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \ -d ../alicedir > co.der smime.sh: #4673: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #4674: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@bogus.com" > alice.enc smime.sh: #4675: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #4676: Decode Encrypted-Data . - PASSED smime.sh: #4677: Compare Decoded and Original Data . - PASSED smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #4678: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice.env -o alice_p7.data smime.sh: #4679: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #4680: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #4681: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #4682: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Tue Nov 8 16:21:43 UTC 2011 Running tests for ssl TIMESTAMP ssl BEGIN: Tue Nov 8 16:21:43 UTC 2011 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:43 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2646 >/dev/null 2>/dev/null selfserv_9519 with PID 2646 found at Tue Nov 8 16:21:43 UTC 2011 selfserv_9519 with PID 2646 started at Tue Nov 8 16:21:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4683: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2646 at Tue Nov 8 16:21:43 UTC 2011 kill -USR1 2646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2646 killed at Tue Nov 8 16:21:43 UTC 2011 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:43 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2702 >/dev/null 2>/dev/null selfserv_9519 with PID 2702 found at Tue Nov 8 16:21:43 UTC 2011 selfserv_9519 with PID 2702 started at Tue Nov 8 16:21:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4684: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2702 at Tue Nov 8 16:21:44 UTC 2011 kill -USR1 2702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2702 killed at Tue Nov 8 16:21:44 UTC 2011 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:44 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2758 >/dev/null 2>/dev/null selfserv_9519 with PID 2758 found at Tue Nov 8 16:21:44 UTC 2011 selfserv_9519 with PID 2758 started at Tue Nov 8 16:21:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4685: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2758 at Tue Nov 8 16:21:44 UTC 2011 kill -USR1 2758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2758 killed at Tue Nov 8 16:21:44 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:44 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2826 >/dev/null 2>/dev/null selfserv_9519 with PID 2826 found at Tue Nov 8 16:21:44 UTC 2011 selfserv_9519 with PID 2826 started at Tue Nov 8 16:21:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4686: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2826 at Tue Nov 8 16:21:44 UTC 2011 kill -USR1 2826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2826 killed at Tue Nov 8 16:21:44 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:44 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2882 >/dev/null 2>/dev/null selfserv_9519 with PID 2882 found at Tue Nov 8 16:21:44 UTC 2011 selfserv_9519 with PID 2882 started at Tue Nov 8 16:21:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4687: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2882 at Tue Nov 8 16:21:44 UTC 2011 kill -USR1 2882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2882 killed at Tue Nov 8 16:21:44 UTC 2011 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:44 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 2938 >/dev/null 2>/dev/null selfserv_9519 with PID 2938 found at Tue Nov 8 16:21:44 UTC 2011 selfserv_9519 with PID 2938 started at Tue Nov 8 16:21:44 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4688: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 2938 at Tue Nov 8 16:21:45 UTC 2011 kill -USR1 2938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 2938 killed at Tue Nov 8 16:21:45 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3006 >/dev/null 2>/dev/null selfserv_9519 with PID 3006 found at Tue Nov 8 16:21:45 UTC 2011 selfserv_9519 with PID 3006 started at Tue Nov 8 16:21:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4689: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3006 at Tue Nov 8 16:21:45 UTC 2011 kill -USR1 3006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3006 killed at Tue Nov 8 16:21:45 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3062 >/dev/null 2>/dev/null selfserv_9519 with PID 3062 found at Tue Nov 8 16:21:45 UTC 2011 selfserv_9519 with PID 3062 started at Tue Nov 8 16:21:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4690: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3062 at Tue Nov 8 16:21:45 UTC 2011 kill -USR1 3062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3062 killed at Tue Nov 8 16:21:45 UTC 2011 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3118 >/dev/null 2>/dev/null selfserv_9519 with PID 3118 found at Tue Nov 8 16:21:45 UTC 2011 selfserv_9519 with PID 3118 started at Tue Nov 8 16:21:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4691: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3118 at Tue Nov 8 16:21:45 UTC 2011 kill -USR1 3118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3118 killed at Tue Nov 8 16:21:45 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3186 >/dev/null 2>/dev/null selfserv_9519 with PID 3186 found at Tue Nov 8 16:21:46 UTC 2011 selfserv_9519 with PID 3186 started at Tue Nov 8 16:21:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4692: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3186 at Tue Nov 8 16:21:46 UTC 2011 kill -USR1 3186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3186 killed at Tue Nov 8 16:21:46 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3242 >/dev/null 2>/dev/null selfserv_9519 with PID 3242 found at Tue Nov 8 16:21:46 UTC 2011 selfserv_9519 with PID 3242 started at Tue Nov 8 16:21:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4693: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3242 at Tue Nov 8 16:21:46 UTC 2011 kill -USR1 3242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3242 killed at Tue Nov 8 16:21:46 UTC 2011 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3298 >/dev/null 2>/dev/null selfserv_9519 with PID 3298 found at Tue Nov 8 16:21:46 UTC 2011 selfserv_9519 with PID 3298 started at Tue Nov 8 16:21:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4694: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3298 at Tue Nov 8 16:21:46 UTC 2011 kill -USR1 3298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3298 killed at Tue Nov 8 16:21:46 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3366 >/dev/null 2>/dev/null selfserv_9519 with PID 3366 found at Tue Nov 8 16:21:46 UTC 2011 selfserv_9519 with PID 3366 started at Tue Nov 8 16:21:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4695: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3366 at Tue Nov 8 16:21:47 UTC 2011 kill -USR1 3366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3366 killed at Tue Nov 8 16:21:47 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:47 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3422 >/dev/null 2>/dev/null selfserv_9519 with PID 3422 found at Tue Nov 8 16:21:47 UTC 2011 selfserv_9519 with PID 3422 started at Tue Nov 8 16:21:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4696: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3422 at Tue Nov 8 16:21:47 UTC 2011 kill -USR1 3422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3422 killed at Tue Nov 8 16:21:47 UTC 2011 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:47 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3478 >/dev/null 2>/dev/null selfserv_9519 with PID 3478 found at Tue Nov 8 16:21:47 UTC 2011 selfserv_9519 with PID 3478 started at Tue Nov 8 16:21:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4697: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3478 at Tue Nov 8 16:21:47 UTC 2011 kill -USR1 3478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3478 killed at Tue Nov 8 16:21:47 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:47 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3546 >/dev/null 2>/dev/null selfserv_9519 with PID 3546 found at Tue Nov 8 16:21:47 UTC 2011 selfserv_9519 with PID 3546 started at Tue Nov 8 16:21:47 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4698: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3546 at Tue Nov 8 16:21:47 UTC 2011 kill -USR1 3546 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3546 killed at Tue Nov 8 16:21:48 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3602 >/dev/null 2>/dev/null selfserv_9519 with PID 3602 found at Tue Nov 8 16:21:48 UTC 2011 selfserv_9519 with PID 3602 started at Tue Nov 8 16:21:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4699: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3602 at Tue Nov 8 16:21:48 UTC 2011 kill -USR1 3602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3602 killed at Tue Nov 8 16:21:48 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3659 >/dev/null 2>/dev/null selfserv_9519 with PID 3659 found at Tue Nov 8 16:21:48 UTC 2011 selfserv_9519 with PID 3659 started at Tue Nov 8 16:21:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4700: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 3659 at Tue Nov 8 16:21:48 UTC 2011 kill -USR1 3659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3659 killed at Tue Nov 8 16:21:48 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3727 >/dev/null 2>/dev/null selfserv_9519 with PID 3727 found at Tue Nov 8 16:21:48 UTC 2011 selfserv_9519 with PID 3727 started at Tue Nov 8 16:21:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4701: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3727 at Tue Nov 8 16:21:48 UTC 2011 kill -USR1 3727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3727 killed at Tue Nov 8 16:21:48 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:48 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3783 >/dev/null 2>/dev/null selfserv_9519 with PID 3783 found at Tue Nov 8 16:21:48 UTC 2011 selfserv_9519 with PID 3783 started at Tue Nov 8 16:21:48 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4702: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3783 at Tue Nov 8 16:21:49 UTC 2011 kill -USR1 3783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3783 killed at Tue Nov 8 16:21:49 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:49 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3839 >/dev/null 2>/dev/null selfserv_9519 with PID 3839 found at Tue Nov 8 16:21:49 UTC 2011 selfserv_9519 with PID 3839 started at Tue Nov 8 16:21:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4703: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3839 at Tue Nov 8 16:21:49 UTC 2011 kill -USR1 3839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3839 killed at Tue Nov 8 16:21:49 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:49 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3911 >/dev/null 2>/dev/null selfserv_9519 with PID 3911 found at Tue Nov 8 16:21:49 UTC 2011 selfserv_9519 with PID 3911 started at Tue Nov 8 16:21:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4704: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3911 at Tue Nov 8 16:21:49 UTC 2011 kill -USR1 3911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3911 killed at Tue Nov 8 16:21:49 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:49 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 3967 >/dev/null 2>/dev/null selfserv_9519 with PID 3967 found at Tue Nov 8 16:21:49 UTC 2011 selfserv_9519 with PID 3967 started at Tue Nov 8 16:21:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4705: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 3967 at Tue Nov 8 16:21:49 UTC 2011 kill -USR1 3967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 3967 killed at Tue Nov 8 16:21:49 UTC 2011 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:49 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4023 >/dev/null 2>/dev/null selfserv_9519 with PID 4023 found at Tue Nov 8 16:21:49 UTC 2011 selfserv_9519 with PID 4023 started at Tue Nov 8 16:21:49 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4706: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4023 at Tue Nov 8 16:21:50 UTC 2011 kill -USR1 4023 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4023 killed at Tue Nov 8 16:21:50 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:50 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4091 >/dev/null 2>/dev/null selfserv_9519 with PID 4091 found at Tue Nov 8 16:21:50 UTC 2011 selfserv_9519 with PID 4091 started at Tue Nov 8 16:21:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4707: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4091 at Tue Nov 8 16:21:50 UTC 2011 kill -USR1 4091 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4091 killed at Tue Nov 8 16:21:50 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:50 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4147 >/dev/null 2>/dev/null selfserv_9519 with PID 4147 found at Tue Nov 8 16:21:50 UTC 2011 selfserv_9519 with PID 4147 started at Tue Nov 8 16:21:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4708: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4147 at Tue Nov 8 16:21:50 UTC 2011 kill -USR1 4147 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4147 killed at Tue Nov 8 16:21:50 UTC 2011 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:50 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4203 >/dev/null 2>/dev/null selfserv_9519 with PID 4203 found at Tue Nov 8 16:21:50 UTC 2011 selfserv_9519 with PID 4203 started at Tue Nov 8 16:21:50 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4709: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4203 at Tue Nov 8 16:21:51 UTC 2011 kill -USR1 4203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4203 killed at Tue Nov 8 16:21:51 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:51 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4271 >/dev/null 2>/dev/null selfserv_9519 with PID 4271 found at Tue Nov 8 16:21:51 UTC 2011 selfserv_9519 with PID 4271 started at Tue Nov 8 16:21:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4710: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4271 at Tue Nov 8 16:21:51 UTC 2011 kill -USR1 4271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4271 killed at Tue Nov 8 16:21:51 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:51 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4327 >/dev/null 2>/dev/null selfserv_9519 with PID 4327 found at Tue Nov 8 16:21:51 UTC 2011 selfserv_9519 with PID 4327 started at Tue Nov 8 16:21:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4711: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4327 at Tue Nov 8 16:21:51 UTC 2011 kill -USR1 4327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4327 killed at Tue Nov 8 16:21:51 UTC 2011 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:51 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4383 >/dev/null 2>/dev/null selfserv_9519 with PID 4383 found at Tue Nov 8 16:21:51 UTC 2011 selfserv_9519 with PID 4383 started at Tue Nov 8 16:21:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4712: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4383 at Tue Nov 8 16:21:51 UTC 2011 kill -USR1 4383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4383 killed at Tue Nov 8 16:21:51 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:51 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4451 >/dev/null 2>/dev/null selfserv_9519 with PID 4451 found at Tue Nov 8 16:21:51 UTC 2011 selfserv_9519 with PID 4451 started at Tue Nov 8 16:21:51 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4713: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4451 at Tue Nov 8 16:21:52 UTC 2011 kill -USR1 4451 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4451 killed at Tue Nov 8 16:21:52 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4507 >/dev/null 2>/dev/null selfserv_9519 with PID 4507 found at Tue Nov 8 16:21:52 UTC 2011 selfserv_9519 with PID 4507 started at Tue Nov 8 16:21:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4714: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4507 at Tue Nov 8 16:21:52 UTC 2011 kill -USR1 4507 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4507 killed at Tue Nov 8 16:21:52 UTC 2011 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4563 >/dev/null 2>/dev/null selfserv_9519 with PID 4563 found at Tue Nov 8 16:21:52 UTC 2011 selfserv_9519 with PID 4563 started at Tue Nov 8 16:21:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! Incorrect password/PIN entered. tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 254 ssl.sh: #4715: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4563 at Tue Nov 8 16:21:52 UTC 2011 kill -USR1 4563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4563 killed at Tue Nov 8 16:21:52 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:52 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4631 >/dev/null 2>/dev/null selfserv_9519 with PID 4631 found at Tue Nov 8 16:21:52 UTC 2011 selfserv_9519 with PID 4631 started at Tue Nov 8 16:21:52 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4716: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4631 at Tue Nov 8 16:21:52 UTC 2011 kill -USR1 4631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4631 killed at Tue Nov 8 16:21:52 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:53 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4687 >/dev/null 2>/dev/null selfserv_9519 with PID 4687 found at Tue Nov 8 16:21:53 UTC 2011 selfserv_9519 with PID 4687 started at Tue Nov 8 16:21:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4717: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4687 at Tue Nov 8 16:21:53 UTC 2011 kill -USR1 4687 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4687 killed at Tue Nov 8 16:21:53 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:53 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4744 >/dev/null 2>/dev/null selfserv_9519 with PID 4744 found at Tue Nov 8 16:21:53 UTC 2011 selfserv_9519 with PID 4744 started at Tue Nov 8 16:21:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 ssl.sh: #4718: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 4744 at Tue Nov 8 16:21:53 UTC 2011 kill -USR1 4744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4744 killed at Tue Nov 8 16:21:53 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:53 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4812 >/dev/null 2>/dev/null selfserv_9519 with PID 4812 found at Tue Nov 8 16:21:53 UTC 2011 selfserv_9519 with PID 4812 started at Tue Nov 8 16:21:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4719: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4812 at Tue Nov 8 16:21:53 UTC 2011 kill -USR1 4812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4812 killed at Tue Nov 8 16:21:53 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:53 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4868 >/dev/null 2>/dev/null selfserv_9519 with PID 4868 found at Tue Nov 8 16:21:53 UTC 2011 selfserv_9519 with PID 4868 started at Tue Nov 8 16:21:53 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4720: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4868 at Tue Nov 8 16:21:54 UTC 2011 kill -USR1 4868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4868 killed at Tue Nov 8 16:21:54 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4924 >/dev/null 2>/dev/null selfserv_9519 with PID 4924 found at Tue Nov 8 16:21:54 UTC 2011 selfserv_9519 with PID 4924 started at Tue Nov 8 16:21:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4721: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4924 at Tue Nov 8 16:21:54 UTC 2011 kill -USR1 4924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4924 killed at Tue Nov 8 16:21:54 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 4992 >/dev/null 2>/dev/null selfserv_9519 with PID 4992 found at Tue Nov 8 16:21:54 UTC 2011 selfserv_9519 with PID 4992 started at Tue Nov 8 16:21:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4722: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 4992 at Tue Nov 8 16:21:54 UTC 2011 kill -USR1 4992 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 4992 killed at Tue Nov 8 16:21:54 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5048 >/dev/null 2>/dev/null selfserv_9519 with PID 5048 found at Tue Nov 8 16:21:54 UTC 2011 selfserv_9519 with PID 5048 started at Tue Nov 8 16:21:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4723: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5048 at Tue Nov 8 16:21:54 UTC 2011 kill -USR1 5048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5048 killed at Tue Nov 8 16:21:54 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:54 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:54 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5104 >/dev/null 2>/dev/null selfserv_9519 with PID 5104 found at Tue Nov 8 16:21:55 UTC 2011 selfserv_9519 with PID 5104 started at Tue Nov 8 16:21:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4724: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5104 at Tue Nov 8 16:21:55 UTC 2011 kill -USR1 5104 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5104 killed at Tue Nov 8 16:21:55 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5172 >/dev/null 2>/dev/null selfserv_9519 with PID 5172 found at Tue Nov 8 16:21:55 UTC 2011 selfserv_9519 with PID 5172 started at Tue Nov 8 16:21:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4725: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5172 at Tue Nov 8 16:21:55 UTC 2011 kill -USR1 5172 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5172 killed at Tue Nov 8 16:21:55 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5228 >/dev/null 2>/dev/null selfserv_9519 with PID 5228 found at Tue Nov 8 16:21:55 UTC 2011 selfserv_9519 with PID 5228 started at Tue Nov 8 16:21:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4726: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5228 at Tue Nov 8 16:21:55 UTC 2011 kill -USR1 5228 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5228 killed at Tue Nov 8 16:21:55 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:55 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5284 >/dev/null 2>/dev/null selfserv_9519 with PID 5284 found at Tue Nov 8 16:21:55 UTC 2011 selfserv_9519 with PID 5284 started at Tue Nov 8 16:21:55 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4727: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5284 at Tue Nov 8 16:21:56 UTC 2011 kill -USR1 5284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5284 killed at Tue Nov 8 16:21:56 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5352 >/dev/null 2>/dev/null selfserv_9519 with PID 5352 found at Tue Nov 8 16:21:56 UTC 2011 selfserv_9519 with PID 5352 started at Tue Nov 8 16:21:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4728: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5352 at Tue Nov 8 16:21:56 UTC 2011 kill -USR1 5352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5352 killed at Tue Nov 8 16:21:56 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5408 >/dev/null 2>/dev/null selfserv_9519 with PID 5408 found at Tue Nov 8 16:21:56 UTC 2011 selfserv_9519 with PID 5408 started at Tue Nov 8 16:21:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4729: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5408 at Tue Nov 8 16:21:56 UTC 2011 kill -USR1 5408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5408 killed at Tue Nov 8 16:21:56 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5464 >/dev/null 2>/dev/null selfserv_9519 with PID 5464 found at Tue Nov 8 16:21:56 UTC 2011 selfserv_9519 with PID 5464 started at Tue Nov 8 16:21:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4730: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5464 at Tue Nov 8 16:21:56 UTC 2011 kill -USR1 5464 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5464 killed at Tue Nov 8 16:21:56 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:56 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5532 >/dev/null 2>/dev/null selfserv_9519 with PID 5532 found at Tue Nov 8 16:21:56 UTC 2011 selfserv_9519 with PID 5532 started at Tue Nov 8 16:21:56 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4731: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5532 at Tue Nov 8 16:21:57 UTC 2011 kill -USR1 5532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5532 killed at Tue Nov 8 16:21:57 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5588 >/dev/null 2>/dev/null selfserv_9519 with PID 5588 found at Tue Nov 8 16:21:57 UTC 2011 selfserv_9519 with PID 5588 started at Tue Nov 8 16:21:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4732: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5588 at Tue Nov 8 16:21:57 UTC 2011 kill -USR1 5588 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5588 killed at Tue Nov 8 16:21:57 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5644 >/dev/null 2>/dev/null selfserv_9519 with PID 5644 found at Tue Nov 8 16:21:57 UTC 2011 selfserv_9519 with PID 5644 started at Tue Nov 8 16:21:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4733: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5644 at Tue Nov 8 16:21:57 UTC 2011 kill -USR1 5644 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5644 killed at Tue Nov 8 16:21:57 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5712 >/dev/null 2>/dev/null selfserv_9519 with PID 5712 found at Tue Nov 8 16:21:57 UTC 2011 selfserv_9519 with PID 5712 started at Tue Nov 8 16:21:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4734: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5712 at Tue Nov 8 16:21:57 UTC 2011 kill -USR1 5712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5712 killed at Tue Nov 8 16:21:57 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:57 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:57 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5768 >/dev/null 2>/dev/null selfserv_9519 with PID 5768 found at Tue Nov 8 16:21:58 UTC 2011 selfserv_9519 with PID 5768 started at Tue Nov 8 16:21:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4735: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5768 at Tue Nov 8 16:21:58 UTC 2011 kill -USR1 5768 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5768 killed at Tue Nov 8 16:21:58 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5824 >/dev/null 2>/dev/null selfserv_9519 with PID 5824 found at Tue Nov 8 16:21:58 UTC 2011 selfserv_9519 with PID 5824 started at Tue Nov 8 16:21:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4736: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 5824 at Tue Nov 8 16:21:58 UTC 2011 kill -USR1 5824 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5824 killed at Tue Nov 8 16:21:58 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5892 >/dev/null 2>/dev/null selfserv_9519 with PID 5892 found at Tue Nov 8 16:21:58 UTC 2011 selfserv_9519 with PID 5892 started at Tue Nov 8 16:21:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4737: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5892 at Tue Nov 8 16:21:58 UTC 2011 kill -USR1 5892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5892 killed at Tue Nov 8 16:21:58 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:58 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 5948 >/dev/null 2>/dev/null selfserv_9519 with PID 5948 found at Tue Nov 8 16:21:58 UTC 2011 selfserv_9519 with PID 5948 started at Tue Nov 8 16:21:58 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4738: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 5948 at Tue Nov 8 16:21:59 UTC 2011 kill -USR1 5948 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 5948 killed at Tue Nov 8 16:21:59 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:21:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6008 >/dev/null 2>/dev/null selfserv_9519 with PID 6008 found at Tue Nov 8 16:21:59 UTC 2011 selfserv_9519 with PID 6008 started at Tue Nov 8 16:21:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4739: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6008 at Tue Nov 8 16:21:59 UTC 2011 kill -USR1 6008 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6008 killed at Tue Nov 8 16:21:59 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6076 >/dev/null 2>/dev/null selfserv_9519 with PID 6076 found at Tue Nov 8 16:21:59 UTC 2011 selfserv_9519 with PID 6076 started at Tue Nov 8 16:21:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4740: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6076 at Tue Nov 8 16:21:59 UTC 2011 kill -USR1 6076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6076 killed at Tue Nov 8 16:21:59 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6132 >/dev/null 2>/dev/null selfserv_9519 with PID 6132 found at Tue Nov 8 16:21:59 UTC 2011 selfserv_9519 with PID 6132 started at Tue Nov 8 16:21:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4741: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6132 at Tue Nov 8 16:21:59 UTC 2011 kill -USR1 6132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6132 killed at Tue Nov 8 16:21:59 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:21:59 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:21:59 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6188 >/dev/null 2>/dev/null selfserv_9519 with PID 6188 found at Tue Nov 8 16:22:00 UTC 2011 selfserv_9519 with PID 6188 started at Tue Nov 8 16:22:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4742: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6188 at Tue Nov 8 16:22:00 UTC 2011 kill -USR1 6188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6188 killed at Tue Nov 8 16:22:00 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6256 >/dev/null 2>/dev/null selfserv_9519 with PID 6256 found at Tue Nov 8 16:22:00 UTC 2011 selfserv_9519 with PID 6256 started at Tue Nov 8 16:22:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4743: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6256 at Tue Nov 8 16:22:00 UTC 2011 kill -USR1 6256 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6256 killed at Tue Nov 8 16:22:00 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6312 >/dev/null 2>/dev/null selfserv_9519 with PID 6312 found at Tue Nov 8 16:22:00 UTC 2011 selfserv_9519 with PID 6312 started at Tue Nov 8 16:22:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4744: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6312 at Tue Nov 8 16:22:00 UTC 2011 kill -USR1 6312 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6312 killed at Tue Nov 8 16:22:00 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:00 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6368 >/dev/null 2>/dev/null selfserv_9519 with PID 6368 found at Tue Nov 8 16:22:00 UTC 2011 selfserv_9519 with PID 6368 started at Tue Nov 8 16:22:00 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4745: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6368 at Tue Nov 8 16:22:01 UTC 2011 kill -USR1 6368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6368 killed at Tue Nov 8 16:22:01 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6436 >/dev/null 2>/dev/null selfserv_9519 with PID 6436 found at Tue Nov 8 16:22:01 UTC 2011 selfserv_9519 with PID 6436 started at Tue Nov 8 16:22:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4746: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6436 at Tue Nov 8 16:22:01 UTC 2011 kill -USR1 6436 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6436 killed at Tue Nov 8 16:22:01 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6492 >/dev/null 2>/dev/null selfserv_9519 with PID 6492 found at Tue Nov 8 16:22:01 UTC 2011 selfserv_9519 with PID 6492 started at Tue Nov 8 16:22:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4747: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6492 at Tue Nov 8 16:22:01 UTC 2011 kill -USR1 6492 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6492 killed at Tue Nov 8 16:22:01 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6548 >/dev/null 2>/dev/null selfserv_9519 with PID 6548 found at Tue Nov 8 16:22:01 UTC 2011 selfserv_9519 with PID 6548 started at Tue Nov 8 16:22:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -w nss -n none < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4748: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6548 at Tue Nov 8 16:22:01 UTC 2011 kill -USR1 6548 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6548 killed at Tue Nov 8 16:22:01 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:22:01 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6616 >/dev/null 2>/dev/null selfserv_9519 with PID 6616 found at Tue Nov 8 16:22:01 UTC 2011 selfserv_9519 with PID 6616 started at Tue Nov 8 16:22:01 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4749: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6616 at Tue Nov 8 16:22:02 UTC 2011 kill -USR1 6616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6616 killed at Tue Nov 8 16:22:02 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:22:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6672 >/dev/null 2>/dev/null selfserv_9519 with PID 6672 found at Tue Nov 8 16:22:02 UTC 2011 selfserv_9519 with PID 6672 started at Tue Nov 8 16:22:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4750: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6672 at Tue Nov 8 16:22:02 UTC 2011 kill -USR1 6672 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6672 killed at Tue Nov 8 16:22:02 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9519 starting at Tue Nov 8 16:22:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6728 >/dev/null 2>/dev/null selfserv_9519 with PID 6728 found at Tue Nov 8 16:22:02 UTC 2011 selfserv_9519 with PID 6728 started at Tue Nov 8 16:22:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. Incorrect password/PIN entered. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer cannot verify your certificate. tstclnt: exiting with return code 1 ssl.sh: #4751: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6728 at Tue Nov 8 16:22:02 UTC 2011 kill -USR1 6728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6728 killed at Tue Nov 8 16:22:02 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6796 >/dev/null 2>/dev/null selfserv_9519 with PID 6796 found at Tue Nov 8 16:22:02 UTC 2011 selfserv_9519 with PID 6796 started at Tue Nov 8 16:22:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4752: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6796 at Tue Nov 8 16:22:02 UTC 2011 kill -USR1 6796 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6796 killed at Tue Nov 8 16:22:02 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:02 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6852 >/dev/null 2>/dev/null selfserv_9519 with PID 6852 found at Tue Nov 8 16:22:02 UTC 2011 selfserv_9519 with PID 6852 started at Tue Nov 8 16:22:02 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #4753: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9519 with PID 6852 at Tue Nov 8 16:22:03 UTC 2011 kill -USR1 6852 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6852 killed at Tue Nov 8 16:22:03 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:03 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6908 >/dev/null 2>/dev/null selfserv_9519 with PID 6908 found at Tue Nov 8 16:22:03 UTC 2011 selfserv_9519 with PID 6908 started at Tue Nov 8 16:22:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 ssl.sh: #4754: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 6908 at Tue Nov 8 16:22:03 UTC 2011 kill -USR1 6908 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6908 killed at Tue Nov 8 16:22:03 UTC 2011 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (bad password) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9519 starting at Tue Nov 8 16:22:03 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:03 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:03 UTC 2011 selfserv_9519 with PID 6980 started at Tue Nov 8 16:22:03 UTC 2011 Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:03 UTC 2011 ssl.sh: #4755: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:03 UTC 2011 ssl.sh: #4756: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:03 UTC 2011 ssl.sh: #4757: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4758: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4759: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4760: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4761: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4762: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4763: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4764: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4765: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4766: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ssl.sh: #4767: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:04 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4768: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4769: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4770: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4771: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4772: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4773: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4774: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4775: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4776: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4777: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:05 UTC 2011 ssl.sh: #4778: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4779: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4780: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4781: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4782: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4783: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4784: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4785: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4786: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4787: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4788: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:06 UTC 2011 ssl.sh: #4789: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:07 UTC 2011 ssl.sh: #4790: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:07 UTC 2011 ssl.sh: #4791: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:07 UTC 2011 ssl.sh: #4792: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:07 UTC 2011 ssl.sh: #4793: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:07 UTC 2011 ssl.sh: #4794: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 6980 >/dev/null 2>/dev/null selfserv_9519 with PID 6980 found at Tue Nov 8 16:22:07 UTC 2011 ssl.sh: #4795: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 6980 at Tue Nov 8 16:22:07 UTC 2011 kill -USR1 6980 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 6980 killed at Tue Nov 8 16:22:07 UTC 2011 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:07 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:07 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:07 UTC 2011 selfserv_9519 with PID 8400 started at Tue Nov 8 16:22:07 UTC 2011 Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:07 UTC 2011 ssl.sh: #4796: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:07 UTC 2011 ssl.sh: #4797: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4798: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4799: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4800: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4801: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4802: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4803: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4804: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4805: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4806: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4807: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:08 UTC 2011 ssl.sh: #4808: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4809: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ssl.sh: #4810: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ssl.sh: #4811: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ssl.sh: #4812: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ssl.sh: #4813: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ssl.sh: #4814: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ssl.sh: #4815: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ssl.sh: #4816: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ssl.sh: #4817: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:09 UTC 2011 ssl.sh: #4818: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4819: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4820: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4821: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4822: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4823: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4824: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4825: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4826: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4827: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4828: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:10 UTC 2011 ssl.sh: #4829: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:11 UTC 2011 ssl.sh: #4830: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:11 UTC 2011 ssl.sh: #4831: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:11 UTC 2011 ssl.sh: #4832: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:11 UTC 2011 ssl.sh: #4833: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:11 UTC 2011 ssl.sh: #4834: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:11 UTC 2011 ssl.sh: #4835: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 254 kill -0 8400 >/dev/null 2>/dev/null selfserv_9519 with PID 8400 found at Tue Nov 8 16:22:11 UTC 2011 ssl.sh: #4836: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9519 with PID 8400 at Tue Nov 8 16:22:11 UTC 2011 kill -USR1 8400 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 8400 killed at Tue Nov 8 16:22:11 UTC 2011 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9826 >/dev/null 2>/dev/null selfserv_9519 with PID 9826 found at Tue Nov 8 16:22:11 UTC 2011 selfserv_9519 with PID 9826 started at Tue Nov 8 16:22:11 UTC 2011 ssl.sh: skipping TLS Require client auth (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 9826 at Tue Nov 8 16:22:11 UTC 2011 kill -USR1 9826 ./ssl.sh: line 207: 9826 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9826 killed at Tue Nov 8 16:22:11 UTC 2011 selfserv_9519 starting at Tue Nov 8 16:22:11 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:11 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:11 UTC 2011 selfserv_9519 with PID 9868 started at Tue Nov 8 16:22:11 UTC 2011 Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4837: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4838: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4839: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4840: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4841: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4842: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4843: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4844: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4845: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:12 UTC 2011 ssl.sh: #4846: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ssl.sh: #4847: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ssl.sh: #4848: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ssl.sh: #4849: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4850: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ssl.sh: #4851: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ssl.sh: #4852: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ssl.sh: #4853: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ssl.sh: #4854: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ssl.sh: #4855: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:13 UTC 2011 ssl.sh: #4856: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ssl.sh: #4857: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ssl.sh: #4858: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ssl.sh: #4859: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ssl.sh: #4860: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ssl.sh: #4861: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ssl.sh: #4862: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ssl.sh: #4863: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4864: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ssl.sh: #4865: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:14 UTC 2011 ssl.sh: #4866: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:15 UTC 2011 ssl.sh: #4867: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:15 UTC 2011 ssl.sh: #4868: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:15 UTC 2011 ssl.sh: #4869: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:15 UTC 2011 ssl.sh: #4870: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:15 UTC 2011 ssl.sh: #4871: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:15 UTC 2011 ssl.sh: #4872: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:15 UTC 2011 ssl.sh: #4873: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:16 UTC 2011 ssl.sh: #4874: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:16 UTC 2011 ssl.sh: #4875: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:16 UTC 2011 ssl.sh: #4876: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 9868 >/dev/null 2>/dev/null selfserv_9519 with PID 9868 found at Tue Nov 8 16:22:16 UTC 2011 ssl.sh: #4877: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 9868 at Tue Nov 8 16:22:16 UTC 2011 kill -USR1 9868 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 9868 killed at Tue Nov 8 16:22:16 UTC 2011 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:16 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:16 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:16 UTC 2011 selfserv_9519 with PID 11291 started at Tue Nov 8 16:22:16 UTC 2011 Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:16 UTC 2011 ssl.sh: #4878: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:16 UTC 2011 ssl.sh: #4879: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:16 UTC 2011 ssl.sh: #4880: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4881: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4882: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4883: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4884: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4885: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4886: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4887: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4888: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4889: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:17 UTC 2011 ssl.sh: #4890: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4891: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4892: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4893: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4894: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4895: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4896: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4897: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4898: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4899: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4900: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:18 UTC 2011 ssl.sh: #4901: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ssl.sh: #4902: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ssl.sh: #4903: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ssl.sh: #4904: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4905: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ssl.sh: #4906: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ssl.sh: #4907: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ssl.sh: #4908: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ssl.sh: #4909: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ssl.sh: #4910: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:19 UTC 2011 ssl.sh: #4911: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:20 UTC 2011 ssl.sh: #4912: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:20 UTC 2011 ssl.sh: #4913: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:20 UTC 2011 ssl.sh: #4914: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:20 UTC 2011 ssl.sh: #4915: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:20 UTC 2011 ssl.sh: #4916: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:20 UTC 2011 ssl.sh: #4917: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 11291 >/dev/null 2>/dev/null selfserv_9519 with PID 11291 found at Tue Nov 8 16:22:20 UTC 2011 ssl.sh: #4918: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 11291 at Tue Nov 8 16:22:20 UTC 2011 kill -USR1 11291 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 11291 killed at Tue Nov 8 16:22:20 UTC 2011 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12715 >/dev/null 2>/dev/null selfserv_9519 with PID 12715 found at Tue Nov 8 16:22:20 UTC 2011 selfserv_9519 with PID 12715 started at Tue Nov 8 16:22:20 UTC 2011 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 12715 at Tue Nov 8 16:22:20 UTC 2011 kill -USR1 12715 ./ssl.sh: line 207: 12715 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12715 killed at Tue Nov 8 16:22:20 UTC 2011 selfserv_9519 starting at Tue Nov 8 16:22:20 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:20 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:20 UTC 2011 selfserv_9519 with PID 12757 started at Tue Nov 8 16:22:20 UTC 2011 Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4919: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4920: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4921: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4922: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4923: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4924: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4925: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4926: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4927: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:21 UTC 2011 ssl.sh: #4928: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ssl.sh: #4929: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ssl.sh: #4930: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ssl.sh: #4931: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4932: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ssl.sh: #4933: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ssl.sh: #4934: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ssl.sh: #4935: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ssl.sh: #4936: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ssl.sh: #4937: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:22 UTC 2011 ssl.sh: #4938: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ssl.sh: #4939: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ssl.sh: #4940: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ssl.sh: #4941: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ssl.sh: #4942: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ssl.sh: #4943: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ssl.sh: #4944: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ssl.sh: #4945: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4946: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ssl.sh: #4947: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:23 UTC 2011 ssl.sh: #4948: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4949: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4950: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4951: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4952: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4953: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4954: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4955: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4956: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4957: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:24 UTC 2011 ssl.sh: #4958: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 12757 >/dev/null 2>/dev/null selfserv_9519 with PID 12757 found at Tue Nov 8 16:22:25 UTC 2011 ssl.sh: #4959: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 12757 at Tue Nov 8 16:22:25 UTC 2011 kill -USR1 12757 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 12757 killed at Tue Nov 8 16:22:25 UTC 2011 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:25 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:25 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:25 UTC 2011 selfserv_9519 with PID 14178 started at Tue Nov 8 16:22:25 UTC 2011 Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:25 UTC 2011 ssl.sh: #4960: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:25 UTC 2011 ssl.sh: #4961: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:25 UTC 2011 ssl.sh: #4962: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:25 UTC 2011 ssl.sh: #4963: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:25 UTC 2011 ssl.sh: #4964: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:25 UTC 2011 ssl.sh: #4965: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:25 UTC 2011 ssl.sh: #4966: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ssl.sh: #4967: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ssl.sh: #4968: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ssl.sh: #4969: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ssl.sh: #4970: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ssl.sh: #4971: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ssl.sh: #4972: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4973: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ssl.sh: #4974: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ssl.sh: #4975: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:26 UTC 2011 ssl.sh: #4976: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4977: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4978: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4979: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4980: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4981: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4982: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4983: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4984: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4985: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:27 UTC 2011 ssl.sh: #4986: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 117 bytes tstclnt: Writing 117 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ================= CRL Reloaded ============= ssl.sh: #4987: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ssl.sh: #4988: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ssl.sh: #4989: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ssl.sh: #4990: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ssl.sh: #4991: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ssl.sh: #4992: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ssl.sh: #4993: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ssl.sh: #4994: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ssl.sh: #4995: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:28 UTC 2011 ssl.sh: #4996: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:29 UTC 2011 ssl.sh: #4997: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:29 UTC 2011 ssl.sh: #4998: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:29 UTC 2011 ssl.sh: #4999: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9519 -h localhost.localdomain -f -d ../client -v \ -2 -T -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. tstclnt: connecting to localhost.localdomain:9519 (address=::1) tstclnt: connect: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA Compression: NULL subject DN: CN=localhost.localdomain,E=localhost.localdomain@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server -1 bytes tstclnt: read from socket failed: SSL peer rejected your certificate as revoked. tstclnt: exiting with return code 1 kill -0 14178 >/dev/null 2>/dev/null selfserv_9519 with PID 14178 found at Tue Nov 8 16:22:29 UTC 2011 ssl.sh: #5000: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9519 with PID 14178 at Tue Nov 8 16:22:29 UTC 2011 kill -USR1 14178 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 14178 killed at Tue Nov 8 16:22:29 UTC 2011 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain \ -w nss -r -r -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15602 >/dev/null 2>/dev/null selfserv_9519 with PID 15602 found at Tue Nov 8 16:22:29 UTC 2011 selfserv_9519 with PID 15602 started at Tue Nov 8 16:22:29 UTC 2011 ssl.sh: skipping TLS Require client auth on 2nd hs (EC) (client auth) (ECC only) ssl.sh: skipping SSL3 Require client auth on 2nd hs (EC) (client auth) (ECC only) trying to kill selfserv_9519 with PID 15602 at Tue Nov 8 16:22:29 UTC 2011 kill -USR1 15602 ./ssl.sh: line 207: 15602 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9519 -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15602 killed at Tue Nov 8 16:22:29 UTC 2011 ssl.sh: SSL Stress Test - server bypass/client bypass =============================== ssl.sh: Stress SSL2 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:22:29 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:29 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 15950 >/dev/null 2>/dev/null selfserv_9519 with PID 15950 found at Tue Nov 8 16:22:29 UTC 2011 selfserv_9519 with PID 15950 started at Tue Nov 8 16:22:29 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C A \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:29 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: SSL2 - 1 server certificates tested. strsclnt completed at Tue Nov 8 16:22:30 UTC 2011 ssl.sh: #5001: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 15950 at Tue Nov 8 16:22:30 UTC 2011 kill -USR1 15950 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 15950 killed at Tue Nov 8 16:22:30 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:22:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16026 >/dev/null 2>/dev/null selfserv_9519 with PID 16026 found at Tue Nov 8 16:22:30 UTC 2011 selfserv_9519 with PID 16026 started at Tue Nov 8 16:22:30 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:30 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:30 UTC 2011 ssl.sh: #5002: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16026 at Tue Nov 8 16:22:30 UTC 2011 kill -USR1 16026 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16026 killed at Tue Nov 8 16:22:30 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:22:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16102 >/dev/null 2>/dev/null selfserv_9519 with PID 16102 found at Tue Nov 8 16:22:30 UTC 2011 selfserv_9519 with PID 16102 started at Tue Nov 8 16:22:30 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:30 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:30 UTC 2011 ssl.sh: #5003: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16102 at Tue Nov 8 16:22:30 UTC 2011 kill -USR1 16102 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16102 killed at Tue Nov 8 16:22:30 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:22:30 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:30 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16178 >/dev/null 2>/dev/null selfserv_9519 with PID 16178 found at Tue Nov 8 16:22:30 UTC 2011 selfserv_9519 with PID 16178 started at Tue Nov 8 16:22:31 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:31 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:31 UTC 2011 ssl.sh: #5004: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16178 at Tue Nov 8 16:22:31 UTC 2011 kill -USR1 16178 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16178 killed at Tue Nov 8 16:22:31 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:22:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16254 >/dev/null 2>/dev/null selfserv_9519 with PID 16254 found at Tue Nov 8 16:22:31 UTC 2011 selfserv_9519 with PID 16254 started at Tue Nov 8 16:22:31 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:31 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:22:31 UTC 2011 ssl.sh: #5005: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16254 at Tue Nov 8 16:22:31 UTC 2011 kill -USR1 16254 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16254 killed at Tue Nov 8 16:22:31 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:22:31 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:31 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16330 >/dev/null 2>/dev/null selfserv_9519 with PID 16330 found at Tue Nov 8 16:22:31 UTC 2011 selfserv_9519 with PID 16330 started at Tue Nov 8 16:22:31 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:31 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:32 UTC 2011 ssl.sh: #5006: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16330 at Tue Nov 8 16:22:32 UTC 2011 kill -USR1 16330 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16330 killed at Tue Nov 8 16:22:32 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:22:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16406 >/dev/null 2>/dev/null selfserv_9519 with PID 16406 found at Tue Nov 8 16:22:32 UTC 2011 selfserv_9519 with PID 16406 started at Tue Nov 8 16:22:32 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:32 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:22:32 UTC 2011 ssl.sh: #5007: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16406 at Tue Nov 8 16:22:32 UTC 2011 kill -USR1 16406 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16406 killed at Tue Nov 8 16:22:32 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:22:32 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:32 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16482 >/dev/null 2>/dev/null selfserv_9519 with PID 16482 found at Tue Nov 8 16:22:32 UTC 2011 selfserv_9519 with PID 16482 started at Tue Nov 8 16:22:32 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:32 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:22:33 UTC 2011 ssl.sh: #5008: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16482 at Tue Nov 8 16:22:33 UTC 2011 kill -USR1 16482 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16482 killed at Tue Nov 8 16:22:33 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ---- selfserv_9519 starting at Tue Nov 8 16:22:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16570 >/dev/null 2>/dev/null selfserv_9519 with PID 16570 found at Tue Nov 8 16:22:33 UTC 2011 selfserv_9519 with PID 16570 started at Tue Nov 8 16:22:33 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:33 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:22:33 UTC 2011 ssl.sh: #5009: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16570 at Tue Nov 8 16:22:33 UTC 2011 kill -USR1 16570 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16570 killed at Tue Nov 8 16:22:33 UTC 2011 ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:33 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:33 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16667 >/dev/null 2>/dev/null selfserv_9519 with PID 16667 found at Tue Nov 8 16:22:33 UTC 2011 selfserv_9519 with PID 16667 started at Tue Nov 8 16:22:33 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:33 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: SSL2 - 100 server certificates tested. strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:22:34 UTC 2011 ssl.sh: #5010: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16667 at Tue Nov 8 16:22:34 UTC 2011 kill -USR1 16667 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16667 killed at Tue Nov 8 16:22:34 UTC 2011 ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:34 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:34 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16742 >/dev/null 2>/dev/null selfserv_9519 with PID 16742 found at Tue Nov 8 16:22:34 UTC 2011 selfserv_9519 with PID 16742 started at Tue Nov 8 16:22:34 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C c -T -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:34 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:22:35 UTC 2011 ssl.sh: #5011: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16742 at Tue Nov 8 16:22:35 UTC 2011 kill -USR1 16742 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16742 killed at Tue Nov 8 16:22:35 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16817 >/dev/null 2>/dev/null selfserv_9519 with PID 16817 found at Tue Nov 8 16:22:35 UTC 2011 selfserv_9519 with PID 16817 started at Tue Nov 8 16:22:35 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:35 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:22:35 UTC 2011 ssl.sh: #5012: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16817 at Tue Nov 8 16:22:35 UTC 2011 kill -USR1 16817 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16817 killed at Tue Nov 8 16:22:35 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:35 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:35 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16892 >/dev/null 2>/dev/null selfserv_9519 with PID 16892 found at Tue Nov 8 16:22:35 UTC 2011 selfserv_9519 with PID 16892 started at Tue Nov 8 16:22:35 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:35 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:22:36 UTC 2011 ssl.sh: #5013: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16892 at Tue Nov 8 16:22:36 UTC 2011 kill -USR1 16892 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16892 killed at Tue Nov 8 16:22:36 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 16968 >/dev/null 2>/dev/null selfserv_9519 with PID 16968 found at Tue Nov 8 16:22:36 UTC 2011 selfserv_9519 with PID 16968 started at Tue Nov 8 16:22:36 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:36 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:36 UTC 2011 ssl.sh: #5014: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 16968 at Tue Nov 8 16:22:36 UTC 2011 kill -USR1 16968 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 16968 killed at Tue Nov 8 16:22:36 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:22:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17044 >/dev/null 2>/dev/null selfserv_9519 with PID 17044 found at Tue Nov 8 16:22:36 UTC 2011 selfserv_9519 with PID 17044 started at Tue Nov 8 16:22:36 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:36 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:36 UTC 2011 ssl.sh: #5015: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17044 at Tue Nov 8 16:22:36 UTC 2011 kill -USR1 17044 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17044 killed at Tue Nov 8 16:22:36 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:36 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:36 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17120 >/dev/null 2>/dev/null selfserv_9519 with PID 17120 found at Tue Nov 8 16:22:37 UTC 2011 selfserv_9519 with PID 17120 started at Tue Nov 8 16:22:37 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:37 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:22:37 UTC 2011 ssl.sh: #5016: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17120 at Tue Nov 8 16:22:37 UTC 2011 kill -USR1 17120 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17120 killed at Tue Nov 8 16:22:37 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:22:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17196 >/dev/null 2>/dev/null selfserv_9519 with PID 17196 found at Tue Nov 8 16:22:37 UTC 2011 selfserv_9519 with PID 17196 started at Tue Nov 8 16:22:37 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -c 100 -C c -n TestUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:37 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:22:37 UTC 2011 ssl.sh: #5017: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17196 at Tue Nov 8 16:22:37 UTC 2011 kill -USR1 17196 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17196 killed at Tue Nov 8 16:22:37 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ---- selfserv_9519 starting at Tue Nov 8 16:22:37 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:37 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17278 >/dev/null 2>/dev/null selfserv_9519 with PID 17278 found at Tue Nov 8 16:22:37 UTC 2011 selfserv_9519 with PID 17278 started at Tue Nov 8 16:22:37 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:37 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:22:38 UTC 2011 ssl.sh: #5018: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17278 at Tue Nov 8 16:22:38 UTC 2011 kill -USR1 17278 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17278 killed at Tue Nov 8 16:22:38 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ---- selfserv_9519 starting at Tue Nov 8 16:22:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../server -n localhost.localdomain -B -s \ -w nss -r -r -u -a localhost-sni.localdomain -k localhost-sni.localdomain -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17360 >/dev/null 2>/dev/null selfserv_9519 with PID 17360 found at Tue Nov 8 16:22:38 UTC 2011 selfserv_9519 with PID 17360 started at Tue Nov 8 16:22:38 UTC 2011 strsclnt -q -p 9519 -d ../client -B -s -w nss -2 -3 -c 1000 -C c -u -a localhost-sni.localdomain \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:38 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:22:38 UTC 2011 ssl.sh: #5019: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17360 at Tue Nov 8 16:22:38 UTC 2011 kill -USR1 17360 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17360 killed at Tue Nov 8 16:22:38 UTC 2011 ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass =============================== ssl.sh: skipping Stress SSL2 RC4 128 with MD5 for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:22:38 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:38 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17825 >/dev/null 2>/dev/null selfserv_9519 with PID 17825 found at Tue Nov 8 16:22:39 UTC 2011 selfserv_9519 with PID 17825 started at Tue Nov 8 16:22:39 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c -T \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:39 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:39 UTC 2011 ssl.sh: #5020: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17825 at Tue Nov 8 16:22:39 UTC 2011 kill -USR1 17825 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17825 killed at Tue Nov 8 16:22:39 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 ---- selfserv_9519 starting at Tue Nov 8 16:22:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17905 >/dev/null 2>/dev/null selfserv_9519 with PID 17905 found at Tue Nov 8 16:22:39 UTC 2011 selfserv_9519 with PID 17905 started at Tue Nov 8 16:22:39 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:39 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:39 UTC 2011 ssl.sh: #5021: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17905 at Tue Nov 8 16:22:39 UTC 2011 kill -USR1 17905 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17905 killed at Tue Nov 8 16:22:39 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (false start) ---- selfserv_9519 starting at Tue Nov 8 16:22:39 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:39 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 17981 >/dev/null 2>/dev/null selfserv_9519 with PID 17981 found at Tue Nov 8 16:22:39 UTC 2011 selfserv_9519 with PID 17981 started at Tue Nov 8 16:22:39 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 1000 -C c -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:39 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:40 UTC 2011 ssl.sh: #5022: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 17981 at Tue Nov 8 16:22:40 UTC 2011 kill -USR1 17981 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 17981 killed at Tue Nov 8 16:22:40 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ---- selfserv_9519 starting at Tue Nov 8 16:22:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18057 >/dev/null 2>/dev/null selfserv_9519 with PID 18057 found at Tue Nov 8 16:22:40 UTC 2011 selfserv_9519 with PID 18057 started at Tue Nov 8 16:22:40 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:40 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:22:40 UTC 2011 ssl.sh: #5023: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18057 at Tue Nov 8 16:22:40 UTC 2011 kill -USR1 18057 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18057 killed at Tue Nov 8 16:22:40 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression) ---- selfserv_9519 starting at Tue Nov 8 16:22:40 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:40 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18133 >/dev/null 2>/dev/null selfserv_9519 with PID 18133 found at Tue Nov 8 16:22:40 UTC 2011 selfserv_9519 with PID 18133 started at Tue Nov 8 16:22:40 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:40 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:41 UTC 2011 ssl.sh: #5024: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18133 at Tue Nov 8 16:22:41 UTC 2011 kill -USR1 18133 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18133 killed at Tue Nov 8 16:22:41 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ---- selfserv_9519 starting at Tue Nov 8 16:22:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18209 >/dev/null 2>/dev/null selfserv_9519 with PID 18209 found at Tue Nov 8 16:22:41 UTC 2011 selfserv_9519 with PID 18209 started at Tue Nov 8 16:22:41 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:41 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:22:41 UTC 2011 ssl.sh: #5025: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18209 at Tue Nov 8 16:22:41 UTC 2011 kill -USR1 18209 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18209 killed at Tue Nov 8 16:22:41 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ---- selfserv_9519 starting at Tue Nov 8 16:22:41 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:41 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18285 >/dev/null 2>/dev/null selfserv_9519 with PID 18285 found at Tue Nov 8 16:22:41 UTC 2011 selfserv_9519 with PID 18285 started at Tue Nov 8 16:22:41 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 1000 -C c -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:41 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes strsclnt completed at Tue Nov 8 16:22:42 UTC 2011 ssl.sh: #5026: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18285 at Tue Nov 8 16:22:42 UTC 2011 kill -USR1 18285 selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable 999 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18285 killed at Tue Nov 8 16:22:42 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test ssl.sh: skipping Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:42 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:42 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18390 >/dev/null 2>/dev/null selfserv_9519 with PID 18390 found at Tue Nov 8 16:22:42 UTC 2011 selfserv_9519 with PID 18390 started at Tue Nov 8 16:22:42 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 100 -C c -T -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:42 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:22:43 UTC 2011 ssl.sh: #5027: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18390 at Tue Nov 8 16:22:43 UTC 2011 kill -USR1 18390 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18390 killed at Tue Nov 8 16:22:43 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:43 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:43 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18465 >/dev/null 2>/dev/null selfserv_9519 with PID 18465 found at Tue Nov 8 16:22:43 UTC 2011 selfserv_9519 with PID 18465 started at Tue Nov 8 16:22:43 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:43 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 100 server certificates tested. strsclnt completed at Tue Nov 8 16:22:45 UTC 2011 ssl.sh: #5028: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18465 at Tue Nov 8 16:22:45 UTC 2011 kill -USR1 18465 selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18465 killed at Tue Nov 8 16:22:45 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18540 >/dev/null 2>/dev/null selfserv_9519 with PID 18540 found at Tue Nov 8 16:22:45 UTC 2011 selfserv_9519 with PID 18540 started at Tue Nov 8 16:22:45 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:45 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:22:45 UTC 2011 ssl.sh: #5029: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18540 at Tue Nov 8 16:22:45 UTC 2011 kill -USR1 18540 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18540 killed at Tue Nov 8 16:22:45 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18616 >/dev/null 2>/dev/null selfserv_9519 with PID 18616 found at Tue Nov 8 16:22:45 UTC 2011 selfserv_9519 with PID 18616 started at Tue Nov 8 16:22:45 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:45 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:45 UTC 2011 ssl.sh: #5030: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18616 at Tue Nov 8 16:22:45 UTC 2011 kill -USR1 18616 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18616 killed at Tue Nov 8 16:22:45 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:22:45 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:45 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18692 >/dev/null 2>/dev/null selfserv_9519 with PID 18692 found at Tue Nov 8 16:22:45 UTC 2011 selfserv_9519 with PID 18692 started at Tue Nov 8 16:22:45 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:45 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt completed at Tue Nov 8 16:22:46 UTC 2011 ssl.sh: #5031: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18692 at Tue Nov 8 16:22:46 UTC 2011 kill -USR1 18692 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18692 killed at Tue Nov 8 16:22:46 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ---- selfserv_9519 starting at Tue Nov 8 16:22:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18768 >/dev/null 2>/dev/null selfserv_9519 with PID 18768 found at Tue Nov 8 16:22:46 UTC 2011 selfserv_9519 with PID 18768 started at Tue Nov 8 16:22:46 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:46 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:22:46 UTC 2011 ssl.sh: #5032: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18768 at Tue Nov 8 16:22:46 UTC 2011 kill -USR1 18768 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18768 killed at Tue Nov 8 16:22:46 UTC 2011 ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ---- selfserv_9519 starting at Tue Nov 8 16:22:46 UTC 2011 selfserv_9519 -D -p 9519 -d ../ext_server -n localhost.localdomain -B -s \ -w nss -r -r -u -z -i ../tests_pid.18966 & trying to connect to selfserv_9519 at Tue Nov 8 16:22:46 UTC 2011 tstclnt -p 9519 -h localhost.localdomain -B -s -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9519 (address=::1) kill -0 18844 >/dev/null 2>/dev/null selfserv_9519 with PID 18844 found at Tue Nov 8 16:22:46 UTC 2011 selfserv_9519 with PID 18844 started at Tue Nov 8 16:22:46 UTC 2011 strsclnt -q -p 9519 -d ../ext_client -B -s -w nss -2 -c 100 -C c -n ExtendedSSLUser -u -z -g \ localhost.localdomain strsclnt started at Tue Nov 8 16:22:46 UTC 2011 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes strsclnt completed at Tue Nov 8 16:22:46 UTC 2011 ssl.sh: #5033: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9519 with PID 18844 at Tue Nov 8 16:22:46 UTC 2011 kill -USR1 18844 selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable 99 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9519 -b -p 9519 2>/dev/null; selfserv_9519 with PID 18844 killed at Tue Nov 8 16:22:46 UTC 2011 ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) (ECC only) ssl.sh: skipping Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) (ECC only) TIMESTAMP ssl END: Tue Nov 8 16:22:46 UTC 2011 Running tests for merge TIMESTAMP merge BEGIN: Tue Nov 8 16:22:46 UTC 2011 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.v1.18966 -t "Test1" sdr.sh: #5034: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.v2.18966 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #5035: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.18966 -t "1234567" sdr.sh: #5036: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.v1.18966 -t "Test1" sdr.sh: #5037: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.v2.18966 -t "The quick brown fox jumped over the lazy dog" sdr.sh: #5038: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.18966 -t "1234567" sdr.sh: #5039: Decrypt - Value 3 - PASSED merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.18966 -t Test2 -f ../tests.pw merge.sh: #5040: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5041: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5042: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5043: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5044: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5045: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:53 2011 Not After : Tue Nov 08 16:20:53 2016 Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:67:e1:fb:6c:6f:47:30:ff:f6:ea:dd:bb:dc:e8:f9: d2:3b:02:f6:07:ac:bf:22:96:fb:34:b2:8b:3c:56:c3: 55:e7:2b:6a:29:2b:8d:6b:90:d4:1f:0c:79:25:6b:36: 51:5c:53:60:0f:39:f7:04:40:58:a3:78:dc:b9:c8:4f: 0b:15:89:29:48:b4:88:4d:8b:16:9a:e1:fa:77:4b:83: 0d:62:83:f4:bd:1b:01:ae:cb:c3:98:bc:e7:3c:d6:7b: d8:35:18:04:8e:e7:1a:e1:b7:66:7c:a6:81:4f:1c:8d: 43:f1:3c:60:e7:48:a4:e2:4b:15:b4:7b:cc:e7:d7:9b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 26:9d:ca:bb:62:52:e4:39:6c:ff:82:75:a0:26:be:37: 19:22:30:a7:21:23:2a:8d:f5:70:77:7a:96:79:65:55: cf:89:27:82:56:7a:33:03:63:91:ed:c6:c4:79:cc:72: ca:85:45:18:4b:ec:f7:e9:ec:51:9a:51:cf:9c:9d:0e: 1d:14:4d:fa:cb:f6:c2:cd:58:62:fc:99:6d:59:5f:07: e8:d2:04:12:a8:c2:bb:1d:61:d2:02:6c:38:1d:ab:43: 76:65:6b:0c:13:2c:3f:10:84:ab:1a:a8:2d:6f:38:33: ff:f5:48:1e:38:80:e2:a0:a0:f4:bf:79:e7:27:0f:6f Fingerprint (MD5): 3A:E2:AB:08:7D:6D:A3:D9:7C:2C:39:B9:00:30:41:53 Fingerprint (SHA1): ED:53:D2:8B:A9:FD:D9:DE:73:D7:BA:36:F0:3A:03:E1:47:7C:C1:84 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #5046: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Tue Nov 08 16:20:54 2011 Not After : Tue Nov 08 16:20:54 2016 Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:7f:f5:9b:2b:35:fe:de:5e:b3:40:3c:1c:9f:fc:99: e7:5b:18:fa:66:b7:f3:7e:0a:58:d3:fb:92:df:00:d5: 00:3f:30:85:99:07:14:8f:9a:dd:c5:3f:2d:1a:70:b9: 6b:82:b0:76:a3:00:e9:68:4c:34:fb:31:a6:55:9d:ef: d6:51:fd:e2:00:58:e2:cd:1b:07:04:d2:a0:6c:55:e1: a6:fc:cf:96:3a:59:81:68:7d:5d:8b:19:f1:30:52:28: 98:99:1a:20:06:06:3e:21:19:bf:47:b8:29:23:78:ba: b1:76:41:4c:6d:a6:cc:f1:15:b0:8a:76:a9:94:ed:d3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 90:0e:a2:93:1c:72:6d:c5:e0:00:c2:98:1b:61:f1:cd: 11:e5:02:a9:b6:aa:0f:42:f8:94:dc:6d:d3:64:b7:cc: b6:b3:eb:a7:dc:cc:dd:0c:f7:29:44:93:9a:0a:d4:f8: 03:0f:da:bf:33:f0:b6:af:95:32:f9:5d:9b:a5:02:ef: 9b:3c:6d:58:ea:c2:8f:e8:7f:5e:1c:96:0c:1b:55:5a: 9e:02:2b:e3:e5:02:d3:19:d6:0a:1f:dd:a1:9c:ba:9f: 1f:00:7b:db:27:33:3a:cf:f8:3d:b4:20:f0:f4:6b:b6: 6e:c6:fa:36:d6:99:0c:9d:8c:b5:3c:70:8b:bd:72:97 Fingerprint (MD5): D6:0D:99:51:46:8A:2B:A7:39:CA:DD:4B:0B:3C:46:85 Fingerprint (SHA1): B4:12:FC:00:33:8F:6A:DE:E6:C9:A8:11:1C:BA:EE:65:E3:FB:1D:42 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #5047: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5048: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C Alice u,u,u bob@bogus.com ,, Dave u,u,u eve@bogus.com ,, localhost.localdomain u,u,u localhost-sni.localdomain u,u,u ExtendedSSLUser u,u,u serverCA C,C,C chain-1-clientCA ,, clientCA T,C,C chain-2-clientCA ,, Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.v3.18966 -t Test2 -f ../tests.pw merge.sh: #5049: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests.v1.18966 -t Test1 -f ../tests.pw merge.sh: #5050: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #5051: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT) From: alice@bogus.com Subject: message Alice --> Bob To: bob@bogus.com This is a test message from Alice to Bob. merge.sh: #5052: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #5053: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Tue Nov 08 16:21:03 2011 Entry (1): Serial Number: 40 (0x28) Revocation Date: Tue Nov 08 16:20:16 2011 Entry Extensions: Name: CRL reason code Entry (2): Serial Number: 42 (0x2a) Revocation Date: Tue Nov 08 16:21:00 2011 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #5054: Verifying TestCA CRL - PASSED TIMESTAMP merge END: Tue Nov 8 16:22:52 UTC 2011 Running tests for chains TIMESTAMP chains BEGIN: Tue Nov 8 16:22:52 UTC 2011 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5055: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162253 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5056: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5057: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5058: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162254 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5059: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5060: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5061: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5062: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1108162255 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5063: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #5064: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1108162256 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5065: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #5066: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5067: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5068: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5069: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1108162257 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5070: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der chains.sh: #5071: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5072: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #5073: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #5074: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162254 (0x420d36ce) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:22:53 2011 Not After : Tue Nov 08 16:22:53 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:8a:6f:4c:a6:1f:91:54:ed:5e:c7:89:6c:e0:4b:2a: 06:23:a0:8f:e6:3a:66:88:d6:be:dc:24:89:fd:d3:fb: 7b:f4:be:f3:7a:2c:f4:23:1a:f5:3a:80:5a:3b:52:e4: 1b:d2:2a:93:4c:77:84:6c:d7:b7:7c:90:9e:e7:24:f7: 36:0a:2f:59:d8:fe:6d:5a:77:a3:36:78:c5:4e:8d:cc: 5f:c7:a3:c1:96:b1:c9:d9:88:b8:4f:08:be:e8:cd:67: 7b:53:f8:33:b7:38:d7:bc:a5:62:42:a5:ad:17:bf:31: 37:b1:f4:68:73:0d:d3:ad:98:fc:21:b8:42:80:ad:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a5:bc:2c:62:ef:25:7e:02:c2:f3:ff:4e:dc:47:32:d3: 99:9f:ba:0f:7f:b3:b9:ea:ee:f6:82:e5:02:f1:a2:18: 35:3d:22:ae:81:37:ed:01:da:9c:88:2e:c1:2a:00:95: 2b:1a:cf:8d:ca:79:9d:41:fb:fc:81:ff:f8:92:96:72: 18:f9:79:a5:51:19:a6:5c:b2:4e:2c:82:c8:d8:d2:1a: 54:c6:fb:c9:32:ae:9d:52:ca:a3:26:e0:6a:2c:89:33: 42:25:2f:bb:b7:48:fc:e0:6b:1e:e5:ee:64:8e:ee:0a: 08:36:db:19:40:c1:b7:21:86:e2:2e:f1:10:72:f7:57 Fingerprint (MD5): 75:58:16:92:50:1A:30:99:5D:A3:9E:66:BB:1C:88:37 Fingerprint (SHA1): A0:AD:98:D5:FF:A1:53:A0:CD:9A:AE:59:F3:4D:CD:23:9A:46:7C:0B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5075: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162253 (0x420d36cd) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:22:53 2011 Not After : Tue Nov 08 16:22:53 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:37:56:a3:da:bc:9c:52:5e:d3:04:c4:c4:61:3b:1b: c1:39:f0:b9:6b:a3:6c:ce:b9:c7:e0:1f:7b:e5:0a:09: 7f:64:15:71:a9:cf:56:bc:99:1c:fb:b9:f9:89:25:fb: 17:b2:82:c3:c9:96:9d:1f:d9:9f:ae:dc:c3:94:8e:7b: 67:e2:41:2a:df:6a:dd:80:36:e1:cd:fb:f5:a6:af:36: 4a:22:e1:51:22:44:e0:98:a6:59:21:75:49:e2:d7:f1: 59:a1:4b:18:bf:3c:ef:33:34:1d:80:11:81:a1:e4:14: a8:4d:60:0e:8d:99:4f:59:0d:18:7d:f3:68:bd:e3:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:f8:70:23:79:1b:5a:41:c7:94:6b:a2:18:a7:e4:0d: 1e:69:53:de:b9:7c:17:90:fe:bc:8d:9e:a8:45:d7:75: dd:e9:3a:73:f5:72:9d:ae:1c:ec:de:15:1e:85:65:2f: 78:48:3e:c5:9e:3d:bd:0a:37:c9:f7:a9:10:17:70:79: 95:3e:a6:a5:b7:2d:73:25:d7:15:55:60:b1:a5:59:bc: ef:26:3b:bf:40:a2:1f:3c:12:44:eb:96:2b:85:ee:17: 18:2a:46:43:ec:61:02:f5:6c:68:a1:f2:27:1a:54:94: f7:d4:7b:ca:7e:8a:6c:2a:04:0f:0e:70:c7:f3:c3:01 Fingerprint (MD5): 33:60:53:15:93:C0:DD:2D:F6:1E:BC:65:A9:52:3F:F2 Fingerprint (SHA1): D4:45:69:DB:0F:6E:42:BF:2B:13:D6:03:D7:3B:50:36:14:7D:12:B3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5076: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5077: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #5078: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #5079: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162253 (0x420d36cd) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:22:53 2011 Not After : Tue Nov 08 16:22:53 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:37:56:a3:da:bc:9c:52:5e:d3:04:c4:c4:61:3b:1b: c1:39:f0:b9:6b:a3:6c:ce:b9:c7:e0:1f:7b:e5:0a:09: 7f:64:15:71:a9:cf:56:bc:99:1c:fb:b9:f9:89:25:fb: 17:b2:82:c3:c9:96:9d:1f:d9:9f:ae:dc:c3:94:8e:7b: 67:e2:41:2a:df:6a:dd:80:36:e1:cd:fb:f5:a6:af:36: 4a:22:e1:51:22:44:e0:98:a6:59:21:75:49:e2:d7:f1: 59:a1:4b:18:bf:3c:ef:33:34:1d:80:11:81:a1:e4:14: a8:4d:60:0e:8d:99:4f:59:0d:18:7d:f3:68:bd:e3:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:f8:70:23:79:1b:5a:41:c7:94:6b:a2:18:a7:e4:0d: 1e:69:53:de:b9:7c:17:90:fe:bc:8d:9e:a8:45:d7:75: dd:e9:3a:73:f5:72:9d:ae:1c:ec:de:15:1e:85:65:2f: 78:48:3e:c5:9e:3d:bd:0a:37:c9:f7:a9:10:17:70:79: 95:3e:a6:a5:b7:2d:73:25:d7:15:55:60:b1:a5:59:bc: ef:26:3b:bf:40:a2:1f:3c:12:44:eb:96:2b:85:ee:17: 18:2a:46:43:ec:61:02:f5:6c:68:a1:f2:27:1a:54:94: f7:d4:7b:ca:7e:8a:6c:2a:04:0f:0e:70:c7:f3:c3:01 Fingerprint (MD5): 33:60:53:15:93:C0:DD:2D:F6:1E:BC:65:A9:52:3F:F2 Fingerprint (SHA1): D4:45:69:DB:0F:6E:42:BF:2B:13:D6:03:D7:3B:50:36:14:7D:12:B3 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5080: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162254 (0x420d36ce) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:22:53 2011 Not After : Tue Nov 08 16:22:53 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:8a:6f:4c:a6:1f:91:54:ed:5e:c7:89:6c:e0:4b:2a: 06:23:a0:8f:e6:3a:66:88:d6:be:dc:24:89:fd:d3:fb: 7b:f4:be:f3:7a:2c:f4:23:1a:f5:3a:80:5a:3b:52:e4: 1b:d2:2a:93:4c:77:84:6c:d7:b7:7c:90:9e:e7:24:f7: 36:0a:2f:59:d8:fe:6d:5a:77:a3:36:78:c5:4e:8d:cc: 5f:c7:a3:c1:96:b1:c9:d9:88:b8:4f:08:be:e8:cd:67: 7b:53:f8:33:b7:38:d7:bc:a5:62:42:a5:ad:17:bf:31: 37:b1:f4:68:73:0d:d3:ad:98:fc:21:b8:42:80:ad:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a5:bc:2c:62:ef:25:7e:02:c2:f3:ff:4e:dc:47:32:d3: 99:9f:ba:0f:7f:b3:b9:ea:ee:f6:82:e5:02:f1:a2:18: 35:3d:22:ae:81:37:ed:01:da:9c:88:2e:c1:2a:00:95: 2b:1a:cf:8d:ca:79:9d:41:fb:fc:81:ff:f8:92:96:72: 18:f9:79:a5:51:19:a6:5c:b2:4e:2c:82:c8:d8:d2:1a: 54:c6:fb:c9:32:ae:9d:52:ca:a3:26:e0:6a:2c:89:33: 42:25:2f:bb:b7:48:fc:e0:6b:1e:e5:ee:64:8e:ee:0a: 08:36:db:19:40:c1:b7:21:86:e2:2e:f1:10:72:f7:57 Fingerprint (MD5): 75:58:16:92:50:1A:30:99:5D:A3:9E:66:BB:1C:88:37 Fingerprint (SHA1): A0:AD:98:D5:FF:A1:53:A0:CD:9A:AE:59:F3:4D:CD:23:9A:46:7C:0B Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5081: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #5082: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #5083: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5084: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5085: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #5086: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162254 (0x420d36ce) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:22:53 2011 Not After : Tue Nov 08 16:22:53 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:8a:6f:4c:a6:1f:91:54:ed:5e:c7:89:6c:e0:4b:2a: 06:23:a0:8f:e6:3a:66:88:d6:be:dc:24:89:fd:d3:fb: 7b:f4:be:f3:7a:2c:f4:23:1a:f5:3a:80:5a:3b:52:e4: 1b:d2:2a:93:4c:77:84:6c:d7:b7:7c:90:9e:e7:24:f7: 36:0a:2f:59:d8:fe:6d:5a:77:a3:36:78:c5:4e:8d:cc: 5f:c7:a3:c1:96:b1:c9:d9:88:b8:4f:08:be:e8:cd:67: 7b:53:f8:33:b7:38:d7:bc:a5:62:42:a5:ad:17:bf:31: 37:b1:f4:68:73:0d:d3:ad:98:fc:21:b8:42:80:ad:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a5:bc:2c:62:ef:25:7e:02:c2:f3:ff:4e:dc:47:32:d3: 99:9f:ba:0f:7f:b3:b9:ea:ee:f6:82:e5:02:f1:a2:18: 35:3d:22:ae:81:37:ed:01:da:9c:88:2e:c1:2a:00:95: 2b:1a:cf:8d:ca:79:9d:41:fb:fc:81:ff:f8:92:96:72: 18:f9:79:a5:51:19:a6:5c:b2:4e:2c:82:c8:d8:d2:1a: 54:c6:fb:c9:32:ae:9d:52:ca:a3:26:e0:6a:2c:89:33: 42:25:2f:bb:b7:48:fc:e0:6b:1e:e5:ee:64:8e:ee:0a: 08:36:db:19:40:c1:b7:21:86:e2:2e:f1:10:72:f7:57 Fingerprint (MD5): 75:58:16:92:50:1A:30:99:5D:A3:9E:66:BB:1C:88:37 Fingerprint (SHA1): A0:AD:98:D5:FF:A1:53:A0:CD:9A:AE:59:F3:4D:CD:23:9A:46:7C:0B Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5087: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162254 (0x420d36ce) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:22:53 2011 Not After : Tue Nov 08 16:22:53 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:8a:6f:4c:a6:1f:91:54:ed:5e:c7:89:6c:e0:4b:2a: 06:23:a0:8f:e6:3a:66:88:d6:be:dc:24:89:fd:d3:fb: 7b:f4:be:f3:7a:2c:f4:23:1a:f5:3a:80:5a:3b:52:e4: 1b:d2:2a:93:4c:77:84:6c:d7:b7:7c:90:9e:e7:24:f7: 36:0a:2f:59:d8:fe:6d:5a:77:a3:36:78:c5:4e:8d:cc: 5f:c7:a3:c1:96:b1:c9:d9:88:b8:4f:08:be:e8:cd:67: 7b:53:f8:33:b7:38:d7:bc:a5:62:42:a5:ad:17:bf:31: 37:b1:f4:68:73:0d:d3:ad:98:fc:21:b8:42:80:ad:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a5:bc:2c:62:ef:25:7e:02:c2:f3:ff:4e:dc:47:32:d3: 99:9f:ba:0f:7f:b3:b9:ea:ee:f6:82:e5:02:f1:a2:18: 35:3d:22:ae:81:37:ed:01:da:9c:88:2e:c1:2a:00:95: 2b:1a:cf:8d:ca:79:9d:41:fb:fc:81:ff:f8:92:96:72: 18:f9:79:a5:51:19:a6:5c:b2:4e:2c:82:c8:d8:d2:1a: 54:c6:fb:c9:32:ae:9d:52:ca:a3:26:e0:6a:2c:89:33: 42:25:2f:bb:b7:48:fc:e0:6b:1e:e5:ee:64:8e:ee:0a: 08:36:db:19:40:c1:b7:21:86:e2:2e:f1:10:72:f7:57 Fingerprint (MD5): 75:58:16:92:50:1A:30:99:5D:A3:9E:66:BB:1C:88:37 Fingerprint (SHA1): A0:AD:98:D5:FF:A1:53:A0:CD:9A:AE:59:F3:4D:CD:23:9A:46:7C:0B Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5088: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #5089: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #5090: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5091: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5092: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #5093: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162253 (0x420d36cd) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:22:53 2011 Not After : Tue Nov 08 16:22:53 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:37:56:a3:da:bc:9c:52:5e:d3:04:c4:c4:61:3b:1b: c1:39:f0:b9:6b:a3:6c:ce:b9:c7:e0:1f:7b:e5:0a:09: 7f:64:15:71:a9:cf:56:bc:99:1c:fb:b9:f9:89:25:fb: 17:b2:82:c3:c9:96:9d:1f:d9:9f:ae:dc:c3:94:8e:7b: 67:e2:41:2a:df:6a:dd:80:36:e1:cd:fb:f5:a6:af:36: 4a:22:e1:51:22:44:e0:98:a6:59:21:75:49:e2:d7:f1: 59:a1:4b:18:bf:3c:ef:33:34:1d:80:11:81:a1:e4:14: a8:4d:60:0e:8d:99:4f:59:0d:18:7d:f3:68:bd:e3:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:f8:70:23:79:1b:5a:41:c7:94:6b:a2:18:a7:e4:0d: 1e:69:53:de:b9:7c:17:90:fe:bc:8d:9e:a8:45:d7:75: dd:e9:3a:73:f5:72:9d:ae:1c:ec:de:15:1e:85:65:2f: 78:48:3e:c5:9e:3d:bd:0a:37:c9:f7:a9:10:17:70:79: 95:3e:a6:a5:b7:2d:73:25:d7:15:55:60:b1:a5:59:bc: ef:26:3b:bf:40:a2:1f:3c:12:44:eb:96:2b:85:ee:17: 18:2a:46:43:ec:61:02:f5:6c:68:a1:f2:27:1a:54:94: f7:d4:7b:ca:7e:8a:6c:2a:04:0f:0e:70:c7:f3:c3:01 Fingerprint (MD5): 33:60:53:15:93:C0:DD:2D:F6:1E:BC:65:A9:52:3F:F2 Fingerprint (SHA1): D4:45:69:DB:0F:6E:42:BF:2B:13:D6:03:D7:3B:50:36:14:7D:12:B3 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5094: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162253 (0x420d36cd) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:22:53 2011 Not After : Tue Nov 08 16:22:53 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:37:56:a3:da:bc:9c:52:5e:d3:04:c4:c4:61:3b:1b: c1:39:f0:b9:6b:a3:6c:ce:b9:c7:e0:1f:7b:e5:0a:09: 7f:64:15:71:a9:cf:56:bc:99:1c:fb:b9:f9:89:25:fb: 17:b2:82:c3:c9:96:9d:1f:d9:9f:ae:dc:c3:94:8e:7b: 67:e2:41:2a:df:6a:dd:80:36:e1:cd:fb:f5:a6:af:36: 4a:22:e1:51:22:44:e0:98:a6:59:21:75:49:e2:d7:f1: 59:a1:4b:18:bf:3c:ef:33:34:1d:80:11:81:a1:e4:14: a8:4d:60:0e:8d:99:4f:59:0d:18:7d:f3:68:bd:e3:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 60:f8:70:23:79:1b:5a:41:c7:94:6b:a2:18:a7:e4:0d: 1e:69:53:de:b9:7c:17:90:fe:bc:8d:9e:a8:45:d7:75: dd:e9:3a:73:f5:72:9d:ae:1c:ec:de:15:1e:85:65:2f: 78:48:3e:c5:9e:3d:bd:0a:37:c9:f7:a9:10:17:70:79: 95:3e:a6:a5:b7:2d:73:25:d7:15:55:60:b1:a5:59:bc: ef:26:3b:bf:40:a2:1f:3c:12:44:eb:96:2b:85:ee:17: 18:2a:46:43:ec:61:02:f5:6c:68:a1:f2:27:1a:54:94: f7:d4:7b:ca:7e:8a:6c:2a:04:0f:0e:70:c7:f3:c3:01 Fingerprint (MD5): 33:60:53:15:93:C0:DD:2D:F6:1E:BC:65:A9:52:3F:F2 Fingerprint (SHA1): D4:45:69:DB:0F:6E:42:BF:2B:13:D6:03:D7:3B:50:36:14:7D:12:B3 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #5095: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #5096: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162258 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5097: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #5098: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #5099: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162259 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5100: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #5101: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #5102: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162260 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5103: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #5104: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #5105: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162261 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5106: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #5107: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #5108: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162262 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5109: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #5110: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #5111: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162263 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5112: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #5113: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #5114: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162264 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5115: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #5116: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #5117: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162265 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5118: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #5119: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #5120: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162266 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5121: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #5122: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #5123: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5124: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1108162267 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5125: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der chains.sh: #5126: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1108162268 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5127: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der chains.sh: #5128: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1108162269 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5129: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der chains.sh: #5130: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #5131: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #5132: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5133: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1108162270 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5134: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der chains.sh: #5135: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1108162271 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5136: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der chains.sh: #5137: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1108162272 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5138: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der chains.sh: #5139: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #5140: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #5141: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5142: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1108162273 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5143: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der chains.sh: #5144: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1108162274 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5145: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der chains.sh: #5146: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1108162275 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5147: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der chains.sh: #5148: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #5149: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #5150: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5151: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1108162276 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5152: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der chains.sh: #5153: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1108162277 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5154: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der chains.sh: #5155: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1108162278 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5156: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der chains.sh: #5157: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #5158: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5159: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5160: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1108162279 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5161: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der chains.sh: #5162: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5163: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5164: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108162280 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5165: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5166: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162258 (0x420d36d2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Tue Nov 08 16:22:59 2011 Not After : Tue Nov 08 16:22:59 2061 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:2f:0a:3c:c0:c7:47:50:4a:cc:d1:e9:c4:02:e4:c1: c3:b9:43:35:a6:19:2d:83:2c:70:08:89:b5:60:31:c8: 84:55:3d:62:4d:b7:49:b7:76:89:ca:fb:d9:8b:1f:02: 2e:fb:e5:70:3c:e2:b0:f3:2f:c1:ec:4b:e9:85:0d:8f: f7:fe:68:b2:02:7a:ca:60:90:75:86:c0:f1:04:83:ac: 92:bc:91:c6:47:aa:d9:a4:af:83:ba:f9:d4:3c:25:83: f9:35:8f:3c:b4:19:bb:94:bc:4e:47:89:81:32:d0:ec: 89:ad:06:f9:7a:af:b3:6f:f3:74:75:3a:0b:65:4d:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 82:4c:dd:da:4c:4a:73:4d:dd:17:25:5c:ee:54:0a:1c: 6d:cc:30:67:31:ca:82:74:67:b5:0d:6f:89:ae:f9:a4: 0a:99:42:d9:7a:4b:a5:5f:7a:01:7c:85:57:d3:11:21: dd:d3:c3:25:4f:6a:42:ce:2a:83:90:4c:f2:34:f7:eb: 3e:9b:fc:07:e0:0f:b5:4a:0f:57:f3:39:6c:54:fa:ec: ee:aa:2d:5e:04:40:6a:c9:35:9f:75:d5:9e:65:eb:03: 04:70:de:49:7c:97:a3:85:ad:88:fa:39:90:d5:c8:8d: 44:b5:e0:73:cd:0d:26:87:aa:a5:7d:84:61:43:d8:db Fingerprint (MD5): 1E:62:05:F4:F9:5B:0B:0B:BF:47:6B:3D:E7:C2:31:04 Fingerprint (SHA1): B8:15:F8:B7:E0:48:54:2C:37:8E:E4:00:93:EC:ED:75:0C:A3:0F:1A Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5167: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162259 (0x420d36d3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Tue Nov 08 16:23:00 2011 Not After : Tue Nov 08 16:23:00 2061 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:a2:cd:e1:f0:87:f2:db:8c:14:88:e1:c3:9f:c9:b0: be:5f:12:ec:09:c7:0d:e7:28:f9:05:61:78:0d:00:9e: 58:2d:f4:20:b2:92:18:4d:fc:0f:0d:70:5e:ab:c2:74: a6:fc:50:2c:a4:4a:38:47:93:e9:4d:31:a3:0b:01:b9: f6:44:44:0a:dc:a8:f1:39:79:37:18:84:c9:43:b6:d1: 55:18:52:77:b7:1d:e3:84:67:02:26:3e:f0:51:45:f2: c6:32:ca:6e:a6:d1:f6:de:22:65:75:e9:ca:4c:3d:5e: 48:05:aa:fd:60:0c:34:75:d2:0c:6d:96:30:46:d0:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3b:a4:c3:4e:a6:1d:54:c0:57:1c:a8:09:0f:ae:01:4a: 95:a2:1f:51:5d:8c:f5:9c:14:24:26:b3:5e:91:d8:de: 11:52:e0:bd:e2:1a:1f:b1:8f:da:5b:af:84:92:d9:53: 85:d8:18:36:b7:ff:83:29:3b:0e:0a:85:95:52:16:d4: fb:8e:4b:de:92:84:d5:4a:cc:2e:49:42:a6:be:8f:ae: b2:b6:a9:78:fa:49:02:64:37:f1:74:2b:51:49:93:33: 07:72:26:a1:1e:04:70:2b:c6:0d:94:ea:87:93:39:7d: ce:b0:3c:e4:17:8d:f9:50:41:09:0a:9a:71:f9:16:bb Fingerprint (MD5): D3:C1:D2:51:91:F5:E7:D6:D5:50:EE:23:C4:3D:97:FA Fingerprint (SHA1): 3F:F5:D1:3A:6B:9B:A4:B8:B2:B2:81:BB:57:B6:8C:5F:A1:5D:E3:82 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5168: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162260 (0x420d36d4) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Tue Nov 08 16:23:01 2011 Not After : Tue Nov 08 16:23:01 2061 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:61:a4:e5:ec:32:27:0a:56:50:6a:b9:1d:49:a0:b8: 47:16:24:0d:9d:39:c9:0b:2f:a5:20:04:f9:46:ab:1a: 66:7f:e6:62:86:19:ff:2d:39:ad:e2:cd:f4:32:3f:ac: 78:bd:39:e0:49:d9:af:c1:7c:9b:3a:6c:e4:9a:87:0f: 56:9b:bb:76:4f:8a:86:e0:79:61:c4:ae:0c:8f:5c:8f: 73:6a:5b:1d:82:56:3f:55:57:2b:fc:10:22:12:7e:7d: 17:93:a8:15:fb:1a:5b:04:70:74:bc:37:e2:2b:81:c5: 01:ae:b7:c8:62:86:49:95:0b:15:51:81:ad:2f:77:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ad:5d:cb:10:98:60:3f:98:ff:53:04:e3:a9:cb:d6:ff: 5f:17:5d:78:d7:d5:f0:9f:23:ce:25:2f:ca:e7:61:11: bc:64:b9:c1:83:30:c9:8e:c8:1d:68:37:d1:b9:cf:77: 9c:c6:86:38:4a:7c:04:e5:94:41:f2:71:7f:3d:bd:e0: c6:9b:19:02:4d:88:4c:6c:37:68:05:cf:c0:2f:de:a8: 0d:31:78:97:92:a2:fe:bc:e0:9f:de:4e:11:97:03:44: b5:df:75:92:7c:bb:ef:e1:c7:a3:f5:50:bf:b2:20:38: 07:ed:e6:50:59:37:1a:78:b5:ff:aa:72:05:b2:a1:1c Fingerprint (MD5): 27:54:5D:98:5F:4C:31:EB:06:15:41:5A:F8:BA:D1:85 Fingerprint (SHA1): A8:5B:A1:04:DC:76:70:D0:0A:9E:C0:F8:87:4D:C4:30:2F:C8:BC:FF Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #5169: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162261 (0x420d36d5) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Tue Nov 08 16:23:02 2011 Not After : Tue Nov 08 16:23:02 2061 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:44:97:a1:0a:d9:95:d1:a9:67:49:20:90:b3:02:48: 52:b9:42:5c:bd:cb:c7:51:4d:77:5f:f4:51:7c:3d:65: 49:23:8a:9c:ea:0f:c0:65:d4:95:1a:a9:d9:8c:f9:be: 7d:b0:62:36:89:fa:97:9d:80:51:70:50:70:a1:7c:8b: 3e:e6:03:20:f6:64:d5:7c:ac:f9:bb:9c:3e:8c:5b:aa: 7e:3d:ed:09:8c:88:da:16:24:be:54:e6:de:c0:b6:bc: d7:24:e3:4b:60:6e:f5:b6:5e:f1:ef:38:9d:12:78:b0: a7:ac:31:14:40:b6:0f:81:12:9a:e1:da:32:f0:18:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6f:de:bc:77:13:7a:6a:89:23:fe:37:cd:8b:5d:77:fa: 21:53:1d:34:82:c4:d8:0a:0e:71:ad:ae:23:d2:4f:bd: ab:8a:62:9a:70:5f:88:bb:0e:f0:8a:62:26:48:b2:f6: 81:41:eb:eb:4b:76:cb:0c:44:5a:1b:c5:01:dd:30:33: bd:fa:4f:ef:e5:14:45:55:5d:0c:d1:66:54:7e:41:32: 7f:00:77:07:03:2a:a8:6c:a4:ac:3f:00:12:f5:e1:4a: c9:f5:31:21:e6:87:8a:55:86:65:04:fd:a7:72:32:8b: 3d:8d:85:4b:b2:31:cf:b4:71:a4:38:2b:86:a3:df:10 Fingerprint (MD5): 14:91:56:DA:83:A9:CC:4D:D5:CE:66:72:11:70:F9:CD Fingerprint (SHA1): A1:EA:90:1B:8B:E9:EB:12:C3:0F:1C:51:D8:2A:24:AB:11:AE:5B:70 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5170: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162262 (0x420d36d6) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Tue Nov 08 16:23:04 2011 Not After : Tue Nov 08 16:23:04 2061 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:4e:7f:1d:15:8c:d3:60:63:c0:9f:87:2c:b4:ba:a0: bc:0c:d3:ce:af:d3:22:89:95:52:69:ce:44:1d:8e:31: 4f:94:b6:54:ba:6b:97:e1:d2:54:fe:ac:c2:fc:49:19: 45:f8:24:b7:03:a3:b9:0f:c7:fc:5e:45:79:26:67:8b: c6:80:32:b9:da:d0:36:e9:04:e9:28:02:6f:c1:e7:62: bc:79:e5:b9:e8:d7:22:f2:15:3a:89:5a:92:31:21:19: 74:91:c2:f5:48:0d:49:e8:33:ba:a0:e2:9d:ef:89:cd: c4:bc:b9:11:4a:33:fe:f5:34:48:97:bc:a0:eb:07:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a1:d4:03:e7:d9:fc:c1:a9:90:9b:76:eb:76:05:0b:b9: 0a:56:ce:d7:d7:8a:d6:35:6e:18:3e:9a:5c:69:34:c7: 61:c6:9f:24:66:9e:d5:81:60:9a:24:86:a5:2e:83:43: 31:b5:65:ad:32:4e:e4:59:d9:b9:45:62:75:c8:c7:43: 19:24:c3:d7:d9:25:f9:8c:15:b2:c9:36:53:fb:81:86: 33:bf:df:b2:29:f4:93:5b:14:e7:a1:cc:77:0b:57:ee: c1:ed:11:1f:ec:fc:db:f7:b6:67:5f:32:97:34:1a:12: b8:d4:4e:1b:3d:61:f4:c0:70:4d:dc:66:a3:d6:9b:e5 Fingerprint (MD5): 1A:54:07:D7:EB:6A:BD:10:AA:51:02:CC:5A:98:96:46 Fingerprint (SHA1): 60:3B:CA:D7:FF:8B:85:4D:75:C1:6E:33:25:A7:4B:05:69:AC:92:EC Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5171: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162263 (0x420d36d7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Tue Nov 08 16:23:05 2011 Not After : Tue Nov 08 16:23:05 2061 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:21:bd:55:a0:c7:ac:93:a6:bf:f0:c6:7b:12:57:86: 91:38:ef:66:75:f4:ae:c9:5f:e7:8e:71:86:97:fc:eb: 24:ea:2a:dd:fa:01:5b:cc:60:58:66:a5:78:5b:18:cf: 78:aa:1d:42:09:77:31:b1:e5:7c:b8:fe:5d:23:b5:15: 18:03:6f:bc:50:a8:1b:54:aa:18:c4:0f:28:09:3c:67: 0a:d1:9a:9a:27:86:16:42:63:62:7b:56:cb:f0:fb:23: 8b:bb:74:15:bf:20:b8:ef:37:ab:f8:f3:d8:ca:17:00: 3f:db:3c:19:19:18:aa:9f:7f:c1:b9:f1:95:ac:f5:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a9:cd:df:58:e3:a8:30:2c:1f:2b:d8:eb:84:ff:c9:c0: 1a:60:d5:28:1c:b1:e1:2c:88:85:bf:6c:a5:df:bc:74: a6:10:a1:86:1b:11:80:b8:b3:0e:18:4a:7e:77:43:e6: 8c:66:8b:13:63:72:9e:98:c9:84:8c:6c:f1:78:b2:f8: 0d:b6:7b:14:c4:b6:c5:a8:05:82:79:ec:76:81:64:a5: 3c:81:d9:c3:a7:a7:a5:34:c6:5a:1c:57:d4:1b:27:e4: fd:dc:1f:a2:e6:33:ab:a7:c7:46:34:0a:7d:61:bb:74: 64:4b:67:a5:7a:d2:40:0c:9b:3c:08:05:22:a6:f0:12 Fingerprint (MD5): A9:49:82:A0:02:B5:1F:E8:EC:D9:3B:00:5C:83:5E:61 Fingerprint (SHA1): A1:1E:86:48:6A:8E:F0:25:1E:D3:13:A4:B7:9B:0C:6D:D4:7B:A4:72 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #5172: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162264 (0x420d36d8) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Tue Nov 08 16:23:05 2011 Not After : Tue Nov 08 16:23:05 2061 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:57:aa:15:e0:bf:42:b2:85:f0:c3:bb:08:b8:4f:5b: 17:45:18:42:80:92:86:b9:93:f8:fd:78:88:aa:8f:f0: 2d:14:9f:73:57:fa:04:f6:70:54:7e:04:5b:7d:d7:ed: 9f:10:b8:d6:a6:94:d4:96:44:26:e5:df:16:06:17:43: 11:54:f2:e3:39:3a:66:1a:57:50:29:42:b7:dc:69:23: cc:f7:8e:7e:cb:d5:10:cc:2a:6e:ff:bf:eb:45:14:36: c9:b8:bf:52:0d:ad:5f:88:89:6f:25:34:33:fd:f8:15: a5:37:97:d0:3a:80:34:e9:b8:0b:03:a0:4a:73:4f:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 7f:05:1d:1d:91:45:73:53:0f:b2:c1:b4:a1:75:31:0d: a2:b8:c6:e7:ed:dc:61:a3:ba:27:2b:c7:49:d8:12:7d: 16:f1:18:f8:ea:5a:4e:22:a0:ab:fc:7e:40:31:9a:f3: d3:ba:75:1d:a2:1d:55:7c:b8:1f:2c:05:a6:c7:66:d5: b1:6c:62:0d:0d:95:23:b5:f0:62:05:8f:80:25:9d:0d: ca:a0:e1:0f:0c:8b:ff:e6:67:04:29:67:c3:93:24:00: 1e:45:40:c8:3a:12:e8:b5:47:f3:5d:24:e2:13:cc:3a: c0:e5:ee:10:0c:29:64:55:16:2e:c0:22:38:54:8e:7c Fingerprint (MD5): C6:D8:22:06:D0:69:E7:AF:25:25:FD:E9:9A:43:3A:E1 Fingerprint (SHA1): 8D:DD:6D:23:1D:F4:45:C5:7B:74:88:82:4C:D6:13:C6:FC:1C:EE:BE Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5173: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162265 (0x420d36d9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Tue Nov 08 16:23:06 2011 Not After : Tue Nov 08 16:23:06 2061 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:4f:1c:69:57:8d:1e:f8:e5:83:f9:75:fc:39:0b:c0: 46:b6:85:32:bf:c7:42:b5:e2:a2:71:1d:24:29:46:ba: 3f:7f:0d:31:b3:c8:1a:49:0c:ea:12:58:f3:0f:26:a6: 86:2e:22:bf:85:85:19:60:2e:64:17:d6:53:10:1d:ea: 0c:93:2f:fa:84:6a:d3:35:ea:ea:29:f8:10:77:77:cb: b1:6e:e5:44:93:7b:28:76:3e:65:25:54:27:23:a1:2e: 08:9e:ee:05:f8:a9:9b:2d:c8:f7:fe:6a:4b:c1:6d:db: e2:de:62:a9:ff:1a:87:4d:63:71:0d:de:4f:cb:5f:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: c6:1a:2f:fd:bc:3e:8f:04:39:ef:77:12:f3:14:f5:b9: 6f:82:f2:c9:de:b7:4a:a8:94:1f:c4:13:42:8a:68:57: f4:07:41:27:a5:50:76:4b:c6:c0:09:47:3b:f7:af:5b: 15:48:cc:40:63:3b:2a:06:11:3d:e2:8f:ab:1e:13:f3: 29:d9:23:13:7c:0e:00:e2:23:86:49:2a:3b:f3:de:7e: 30:44:48:2c:c4:ee:e1:e2:3a:af:b8:a3:cd:ce:17:bd: 1c:02:38:57:3a:35:49:99:64:65:a5:b8:e0:19:18:13: 51:c5:2d:76:dc:63:3c:99:79:be:67:a7:2c:42:2d:3d Fingerprint (MD5): 7B:B4:96:B3:56:6A:26:AD:BA:FE:C0:A1:FE:2F:4D:6D Fingerprint (SHA1): 9F:31:32:AD:E0:42:5F:5F:46:0C:09:C6:53:F4:43:4F:41:7B:D6:6C Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5174: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162266 (0x420d36da) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Tue Nov 08 16:23:07 2011 Not After : Tue Nov 08 16:23:07 2061 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:fd:fa:7c:2b:cb:ad:2d:48:76:94:e8:96:b2:51:56: c8:0f:c7:78:1d:08:c4:cf:28:13:18:95:6c:41:9c:54: b1:ef:0e:8b:67:d1:3c:d8:55:69:ce:10:78:eb:34:c0: 09:ee:75:c7:e0:5c:14:10:67:1a:a4:bf:a7:5e:7b:39: 8c:14:99:5a:d0:87:51:ce:75:30:b1:95:0c:3e:2c:19: ad:21:db:6b:45:c8:23:a7:eb:2a:0d:73:ee:b6:b1:7f: e6:93:cc:51:2c:30:21:49:81:54:13:c2:70:09:27:b1: dd:8f:f5:b4:9a:82:95:19:9c:a9:eb:3d:df:0c:09:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 38:a4:37:3f:fc:b4:04:f1:c5:f2:6c:b3:13:71:30:64: 9d:9f:2c:af:7f:cc:36:83:d5:0e:32:af:64:fc:d3:96: d6:1f:fb:02:17:5a:e1:d0:9e:fa:b3:63:ef:9d:02:e2: 01:0d:ca:f2:15:dc:e6:38:9a:3a:c1:c5:23:a6:a7:e9: fe:52:53:2f:dc:c0:e2:ad:7a:3b:3f:b9:76:53:02:2c: 98:f3:27:82:79:b3:a5:8f:e5:27:25:66:0f:58:bc:e2: 2e:9b:fb:8a:07:81:fb:77:e3:1c:75:63:bb:c8:3c:68: 95:9a:0b:20:5e:71:4d:d8:69:01:bb:fc:32:f8:09:53 Fingerprint (MD5): 2C:EB:89:56:5F:32:92:FC:3E:7A:89:67:84:8C:8C:35 Fingerprint (SHA1): 66:A3:05:94:25:C7:CD:60:41:C2:CD:38:5B:6A:9A:50:25:91:1C:37 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #5175: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5176: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162281 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5177: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5178: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5179: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5180: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108162282 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5181: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5182: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5183: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5184: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108162283 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5185: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5186: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5187: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5188: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1108162284 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5189: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #5190: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5191: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162281 (0x420d36e9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:15 2011 Not After : Tue Nov 08 16:23:15 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:a4:36:72:f0:1f:7b:38:b4:a7:4d:f5:a2:bb:89:e0: f1:b6:ba:0d:b8:9b:c4:ad:69:12:d3:85:c5:4a:21:89: b1:f0:70:e6:f7:62:7e:e4:90:1b:b2:be:49:de:db:7e: 35:27:89:2a:25:36:74:68:0e:ec:d9:8f:17:81:68:9f: 85:5f:90:0d:92:37:8a:e7:a8:d6:e3:c8:dd:2a:62:a0: df:94:15:c4:fa:48:5a:3c:76:73:77:12:39:16:a7:09: 36:e4:b6:44:95:e0:d4:84:8c:69:1d:b4:a2:ed:71:55: fb:36:f3:b0:11:cc:a2:78:51:0b:38:44:35:4b:ed:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0b:a0:59:d3:6f:0d:7e:1f:6f:53:d5:c0:21:44:ed:5f: ce:69:ed:4a:93:ff:cf:53:80:6a:bd:be:5b:63:b7:9e: a7:6c:3a:ac:88:4f:a8:e9:d5:b7:e8:17:2e:3c:1f:8b: f0:e0:d1:be:34:4b:3f:33:9f:a9:e4:d7:96:2c:0d:9f: c3:ba:ee:ef:44:f2:1e:18:e1:0e:ad:b4:04:14:13:2a: 3b:cc:09:e7:ad:17:be:7f:29:f3:db:6f:64:0c:cd:4e: 26:18:25:93:15:bd:b6:50:fe:c8:6d:51:7e:71:dc:f8: 82:93:4d:a2:84:60:96:a2:95:5d:e3:b6:32:de:b3:a0 Fingerprint (MD5): 2A:58:2F:6B:C8:DE:C9:7D:83:AF:54:F3:05:69:AD:1B Fingerprint (SHA1): E4:75:EB:6E:5E:CB:9B:61:09:B1:18:23:F6:E8:7D:3C:37:73:AF:24 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5192: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5193: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162282 (0x420d36ea) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:16 2011 Not After : Tue Nov 08 16:23:16 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:10:c6:67:59:0c:ff:2d:61:02:cc:ea:d7:c4:b9:f3: a5:81:9e:74:51:55:6d:5a:13:17:57:69:a1:df:8e:77: 09:a8:93:d6:60:0c:c9:18:96:8c:88:83:eb:01:b1:fd: 07:cc:ee:f2:83:25:1f:64:07:14:00:f2:80:57:e6:99: 65:6f:b5:9e:cb:b5:fb:77:2b:4a:6b:83:33:15:56:39: 79:6c:e4:7e:a8:7a:65:70:57:4f:3b:cc:10:63:cd:ce: f2:eb:b8:2c:0a:99:8b:13:16:12:a3:e5:b4:b2:95:b4: 82:b1:e1:b1:e0:66:e8:70:c1:12:c6:48:ff:4d:9c:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 27:8a:c4:bc:72:e6:8d:ff:a6:34:78:74:fe:6b:ed:11: 79:09:50:e5:12:d8:5d:5e:4b:7e:42:4b:40:78:0d:9b: 39:71:b5:43:d4:af:7f:f6:d6:7c:8e:12:7e:10:6f:35: e3:83:8c:0e:95:dd:91:cf:96:de:0d:b1:ba:c3:44:8d: 5b:4c:67:7e:53:89:53:54:b0:99:f8:fc:c9:50:18:d7: 26:0e:5f:80:2a:a6:e4:1b:7a:bc:f5:f4:1e:bb:ba:2f: ec:b0:fc:90:13:74:33:a8:f1:65:3c:75:b5:18:28:45: d4:67:8b:b7:c1:6f:8d:57:3e:6a:28:d7:20:38:4b:ba Fingerprint (MD5): 1D:0C:06:E6:83:86:63:09:6D:C5:7B:05:0F:15:31:4C Fingerprint (SHA1): F1:E2:D9:DF:46:1A:5E:B5:16:2A:12:6F:26:B4:4D:8C:7D:40:37:C9 Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5194: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5195: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162283 (0x420d36eb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:23:17 2011 Not After : Tue Nov 08 16:23:17 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:7c:47:8d:6d:1e:41:c1:98:a4:9d:43:de:cc:dc:29: eb:9a:9d:46:cd:48:f0:d6:5d:6c:fd:d4:9f:b3:96:ab: 82:ab:fa:23:81:a6:7a:39:62:bf:04:ee:2b:88:18:6f: d8:58:18:c9:3d:f1:d8:6a:85:fe:18:65:fe:0c:85:a4: 07:c4:3f:11:bc:66:4b:cf:40:b5:f1:bc:85:dc:d6:78: e4:39:e6:a7:32:16:3d:74:42:95:19:0e:f2:37:72:e1: 49:76:8b:2c:06:01:1d:5b:df:02:ef:f7:2e:0e:7a:65: bf:a2:59:82:1c:6e:0a:df:c8:1d:95:a4:2a:ca:86:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:c8:75:5e:9b:b0:4c:cc:11:bc:48:11:cb:d1:78:02: e5:78:40:64:00:1f:e7:d4:cd:33:82:ab:6e:2b:2b:cd: 2b:d8:b2:a4:a9:b2:6a:da:2c:de:8d:5a:9b:65:42:da: 74:1a:34:05:06:75:3a:23:d8:52:eb:0c:d8:ca:3f:3d: 8d:9e:12:81:4c:5b:8b:b7:b7:fc:5a:c0:08:8d:ca:dc: f3:2a:7c:22:a0:9c:d0:8e:55:b4:75:37:70:24:b8:3e: fe:a3:c8:a7:d5:8b:35:5d:2d:de:70:4a:fd:28:e6:80: de:88:38:07:5f:29:b0:ac:87:7c:7c:f6:ad:26:97:c2 Fingerprint (MD5): 15:3C:33:F2:61:B8:15:75:A6:C6:B5:5C:F3:FE:50:36 Fingerprint (SHA1): 87:1E:A6:27:E4:62:73:CB:B3:51:38:BE:81:7D:F5:A0:6D:CD:55:18 Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5196: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5197: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5198: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5199: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5200: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162281 (0x420d36e9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:15 2011 Not After : Tue Nov 08 16:23:15 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:a4:36:72:f0:1f:7b:38:b4:a7:4d:f5:a2:bb:89:e0: f1:b6:ba:0d:b8:9b:c4:ad:69:12:d3:85:c5:4a:21:89: b1:f0:70:e6:f7:62:7e:e4:90:1b:b2:be:49:de:db:7e: 35:27:89:2a:25:36:74:68:0e:ec:d9:8f:17:81:68:9f: 85:5f:90:0d:92:37:8a:e7:a8:d6:e3:c8:dd:2a:62:a0: df:94:15:c4:fa:48:5a:3c:76:73:77:12:39:16:a7:09: 36:e4:b6:44:95:e0:d4:84:8c:69:1d:b4:a2:ed:71:55: fb:36:f3:b0:11:cc:a2:78:51:0b:38:44:35:4b:ed:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0b:a0:59:d3:6f:0d:7e:1f:6f:53:d5:c0:21:44:ed:5f: ce:69:ed:4a:93:ff:cf:53:80:6a:bd:be:5b:63:b7:9e: a7:6c:3a:ac:88:4f:a8:e9:d5:b7:e8:17:2e:3c:1f:8b: f0:e0:d1:be:34:4b:3f:33:9f:a9:e4:d7:96:2c:0d:9f: c3:ba:ee:ef:44:f2:1e:18:e1:0e:ad:b4:04:14:13:2a: 3b:cc:09:e7:ad:17:be:7f:29:f3:db:6f:64:0c:cd:4e: 26:18:25:93:15:bd:b6:50:fe:c8:6d:51:7e:71:dc:f8: 82:93:4d:a2:84:60:96:a2:95:5d:e3:b6:32:de:b3:a0 Fingerprint (MD5): 2A:58:2F:6B:C8:DE:C9:7D:83:AF:54:F3:05:69:AD:1B Fingerprint (SHA1): E4:75:EB:6E:5E:CB:9B:61:09:B1:18:23:F6:E8:7D:3C:37:73:AF:24 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5201: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5202: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162282 (0x420d36ea) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:16 2011 Not After : Tue Nov 08 16:23:16 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:10:c6:67:59:0c:ff:2d:61:02:cc:ea:d7:c4:b9:f3: a5:81:9e:74:51:55:6d:5a:13:17:57:69:a1:df:8e:77: 09:a8:93:d6:60:0c:c9:18:96:8c:88:83:eb:01:b1:fd: 07:cc:ee:f2:83:25:1f:64:07:14:00:f2:80:57:e6:99: 65:6f:b5:9e:cb:b5:fb:77:2b:4a:6b:83:33:15:56:39: 79:6c:e4:7e:a8:7a:65:70:57:4f:3b:cc:10:63:cd:ce: f2:eb:b8:2c:0a:99:8b:13:16:12:a3:e5:b4:b2:95:b4: 82:b1:e1:b1:e0:66:e8:70:c1:12:c6:48:ff:4d:9c:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 27:8a:c4:bc:72:e6:8d:ff:a6:34:78:74:fe:6b:ed:11: 79:09:50:e5:12:d8:5d:5e:4b:7e:42:4b:40:78:0d:9b: 39:71:b5:43:d4:af:7f:f6:d6:7c:8e:12:7e:10:6f:35: e3:83:8c:0e:95:dd:91:cf:96:de:0d:b1:ba:c3:44:8d: 5b:4c:67:7e:53:89:53:54:b0:99:f8:fc:c9:50:18:d7: 26:0e:5f:80:2a:a6:e4:1b:7a:bc:f5:f4:1e:bb:ba:2f: ec:b0:fc:90:13:74:33:a8:f1:65:3c:75:b5:18:28:45: d4:67:8b:b7:c1:6f:8d:57:3e:6a:28:d7:20:38:4b:ba Fingerprint (MD5): 1D:0C:06:E6:83:86:63:09:6D:C5:7B:05:0F:15:31:4C Fingerprint (SHA1): F1:E2:D9:DF:46:1A:5E:B5:16:2A:12:6F:26:B4:4D:8C:7D:40:37:C9 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5203: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5204: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162283 (0x420d36eb) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:23:17 2011 Not After : Tue Nov 08 16:23:17 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:7c:47:8d:6d:1e:41:c1:98:a4:9d:43:de:cc:dc:29: eb:9a:9d:46:cd:48:f0:d6:5d:6c:fd:d4:9f:b3:96:ab: 82:ab:fa:23:81:a6:7a:39:62:bf:04:ee:2b:88:18:6f: d8:58:18:c9:3d:f1:d8:6a:85:fe:18:65:fe:0c:85:a4: 07:c4:3f:11:bc:66:4b:cf:40:b5:f1:bc:85:dc:d6:78: e4:39:e6:a7:32:16:3d:74:42:95:19:0e:f2:37:72:e1: 49:76:8b:2c:06:01:1d:5b:df:02:ef:f7:2e:0e:7a:65: bf:a2:59:82:1c:6e:0a:df:c8:1d:95:a4:2a:ca:86:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 79:c8:75:5e:9b:b0:4c:cc:11:bc:48:11:cb:d1:78:02: e5:78:40:64:00:1f:e7:d4:cd:33:82:ab:6e:2b:2b:cd: 2b:d8:b2:a4:a9:b2:6a:da:2c:de:8d:5a:9b:65:42:da: 74:1a:34:05:06:75:3a:23:d8:52:eb:0c:d8:ca:3f:3d: 8d:9e:12:81:4c:5b:8b:b7:b7:fc:5a:c0:08:8d:ca:dc: f3:2a:7c:22:a0:9c:d0:8e:55:b4:75:37:70:24:b8:3e: fe:a3:c8:a7:d5:8b:35:5d:2d:de:70:4a:fd:28:e6:80: de:88:38:07:5f:29:b0:ac:87:7c:7c:f6:ad:26:97:c2 Fingerprint (MD5): 15:3C:33:F2:61:B8:15:75:A6:C6:B5:5C:F3:FE:50:36 Fingerprint (SHA1): 87:1E:A6:27:E4:62:73:CB:B3:51:38:BE:81:7D:F5:A0:6D:CD:55:18 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5205: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5206: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5207: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162285 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5208: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5209: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5210: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5211: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108162286 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5212: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5213: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5214: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5215: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108162287 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5216: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5217: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5218: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5219: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1108162288 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5220: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #5221: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5222: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5223: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1108162289 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5224: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #5225: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5226: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162285 (0x420d36ed) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:20 2011 Not After : Tue Nov 08 16:23:20 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:21:ce:89:0c:76:9c:78:44:35:ec:6c:d5:db:7b:1d: 94:e4:9d:c0:60:55:16:6c:43:3d:8c:4a:b3:6b:7a:4e: a4:e7:c1:72:d6:4d:c5:6b:6d:fe:a8:c6:fd:cb:60:40: 49:b3:93:ca:43:df:0c:b5:48:ae:40:56:5d:1e:2e:95: 61:10:f5:ab:4c:2a:d9:5c:27:79:e8:21:6f:af:d9:97: 1e:96:7e:20:3c:5e:e2:7d:7b:b2:e9:53:c5:a2:46:4e: d9:4d:d7:cc:27:52:c4:1c:13:bc:50:65:aa:6f:20:00: b4:71:c1:e0:31:bc:c6:a5:17:86:6a:8e:26:65:9d:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 71:24:8b:44:95:0b:e3:99:f3:3b:36:21:23:77:32:4f: 71:6d:a4:33:9b:db:04:35:a9:f2:ca:ab:a0:f4:1c:7d: 07:b9:42:37:a1:fc:a6:2b:1a:ae:c6:58:64:b9:75:28: 7b:c5:6a:24:aa:59:4e:8d:57:12:04:1b:b8:4b:80:92: b2:80:58:66:7c:39:36:64:15:14:94:7f:6f:f1:8e:c9: 3c:2b:d5:e5:7b:df:64:64:ba:73:3c:2d:c5:8c:bb:5d: cb:f9:63:29:ae:be:64:18:73:2d:01:86:ea:87:7c:c0: 15:b0:d2:d4:fa:67:f5:cd:a4:3f:8e:ea:43:48:1d:0e Fingerprint (MD5): DD:07:A6:38:86:C8:DE:0A:75:83:CC:13:BF:AA:11:7F Fingerprint (SHA1): 80:6F:CB:54:DF:92:E9:FD:35:D9:83:88:6D:FE:3E:4A:09:57:17:F1 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5227: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5228: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162286 (0x420d36ee) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:21 2011 Not After : Tue Nov 08 16:23:21 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a0:30:ac:a2:8c:d2:b6:82:8a:b2:53:20:eb:6b:84: ff:24:55:b8:ff:93:5f:8a:3b:f5:62:9d:fe:c2:ae:8e: 45:b0:2d:f0:cd:d2:96:13:f8:91:73:2f:07:6d:57:87: 77:bb:d1:e8:ba:72:ae:06:cb:84:72:d8:c1:09:94:d2: 4f:f8:09:d1:43:67:51:51:7d:91:e0:b5:74:94:57:63: 19:2d:10:65:4b:b7:fc:48:8d:63:78:1a:cf:65:fe:5e: ab:42:5f:51:0f:92:f3:31:8f:4d:3c:a8:90:68:92:22: 82:92:29:9b:b5:e2:cd:1f:20:8d:27:4e:56:bf:24:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6f:90:b6:fe:c8:da:f0:82:e3:e9:9c:20:3e:7b:30:de: 37:08:55:33:f8:1e:e0:4c:84:ee:ba:e2:ee:45:f3:16: e5:5d:ae:a3:a1:f6:19:11:4e:02:fb:d5:9f:87:f7:61: 73:12:8f:57:7d:34:b8:9e:50:c2:78:78:dd:81:0a:fe: d6:d3:52:80:f3:09:1a:c4:e4:04:6a:a5:f7:e8:18:4e: 6b:17:4d:f2:46:55:46:85:55:f0:3a:d6:b9:8e:db:ca: 03:b2:0f:37:67:c0:a4:c4:d1:6e:67:83:50:74:1b:e6: ba:98:1e:c1:f6:b5:79:1a:43:dd:28:a3:8c:f9:02:4c Fingerprint (MD5): 1D:42:8D:BA:A7:94:CD:D0:8C:33:95:D9:E2:84:03:13 Fingerprint (SHA1): 6F:A9:B5:1E:52:E8:29:5B:5E:68:68:3F:26:30:10:CB:3E:2E:A8:BD Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5229: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5230: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162287 (0x420d36ef) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:23:22 2011 Not After : Tue Nov 08 16:23:22 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:4c:92:e0:9b:53:07:00:43:54:dd:0c:cd:08:48:55: d3:cf:66:e6:4e:3e:ea:7a:5c:05:c1:d0:da:8f:b7:5a: 2a:a3:42:ae:63:9d:41:e3:3d:4e:22:2f:fb:87:91:90: 8b:89:8b:84:40:a7:ac:bc:3a:05:e9:94:39:9d:8a:f5: 20:ac:8f:8f:75:db:92:47:20:9f:37:18:9a:09:39:1b: e2:19:bb:60:4e:e0:e0:67:9a:c3:3e:ea:b6:d7:a4:90: 87:ff:0e:3d:2f:fe:ae:ec:84:09:7c:a3:29:5a:07:bc: 62:83:b6:de:30:a5:70:0f:77:39:d0:a9:59:1a:5b:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 94:9f:90:38:4a:aa:f8:83:ef:a6:8d:b9:a1:9e:3e:fd: 1d:73:cc:9d:54:0f:9b:53:6a:88:e9:80:61:d0:a2:d4: 6e:64:2b:a1:f7:94:97:47:01:a6:83:a8:20:97:c2:bc: f1:45:68:b3:95:37:27:7c:24:10:37:5c:51:bf:e8:80: 10:be:10:f7:26:94:0c:46:77:3c:fd:1b:4e:6a:97:a3: 36:41:db:ed:56:85:86:a2:60:ba:32:07:65:76:e7:90: 96:eb:a6:7e:6d:af:c6:a2:85:df:8e:ca:6d:63:3e:a8: 6c:48:07:3a:e9:40:a8:04:01:51:67:69:85:72:1c:a7 Fingerprint (MD5): 6A:0D:77:4B:5F:D8:A8:5E:2D:D0:AC:14:38:6D:F6:D3 Fingerprint (SHA1): B8:14:D8:DF:A2:3E:90:EB:CB:9C:09:87:3A:66:46:B7:B5:55:D4:93 Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5231: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5232: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5233: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5234: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5235: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162285 (0x420d36ed) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:20 2011 Not After : Tue Nov 08 16:23:20 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:21:ce:89:0c:76:9c:78:44:35:ec:6c:d5:db:7b:1d: 94:e4:9d:c0:60:55:16:6c:43:3d:8c:4a:b3:6b:7a:4e: a4:e7:c1:72:d6:4d:c5:6b:6d:fe:a8:c6:fd:cb:60:40: 49:b3:93:ca:43:df:0c:b5:48:ae:40:56:5d:1e:2e:95: 61:10:f5:ab:4c:2a:d9:5c:27:79:e8:21:6f:af:d9:97: 1e:96:7e:20:3c:5e:e2:7d:7b:b2:e9:53:c5:a2:46:4e: d9:4d:d7:cc:27:52:c4:1c:13:bc:50:65:aa:6f:20:00: b4:71:c1:e0:31:bc:c6:a5:17:86:6a:8e:26:65:9d:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 71:24:8b:44:95:0b:e3:99:f3:3b:36:21:23:77:32:4f: 71:6d:a4:33:9b:db:04:35:a9:f2:ca:ab:a0:f4:1c:7d: 07:b9:42:37:a1:fc:a6:2b:1a:ae:c6:58:64:b9:75:28: 7b:c5:6a:24:aa:59:4e:8d:57:12:04:1b:b8:4b:80:92: b2:80:58:66:7c:39:36:64:15:14:94:7f:6f:f1:8e:c9: 3c:2b:d5:e5:7b:df:64:64:ba:73:3c:2d:c5:8c:bb:5d: cb:f9:63:29:ae:be:64:18:73:2d:01:86:ea:87:7c:c0: 15:b0:d2:d4:fa:67:f5:cd:a4:3f:8e:ea:43:48:1d:0e Fingerprint (MD5): DD:07:A6:38:86:C8:DE:0A:75:83:CC:13:BF:AA:11:7F Fingerprint (SHA1): 80:6F:CB:54:DF:92:E9:FD:35:D9:83:88:6D:FE:3E:4A:09:57:17:F1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5236: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5237: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162286 (0x420d36ee) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:21 2011 Not After : Tue Nov 08 16:23:21 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a0:30:ac:a2:8c:d2:b6:82:8a:b2:53:20:eb:6b:84: ff:24:55:b8:ff:93:5f:8a:3b:f5:62:9d:fe:c2:ae:8e: 45:b0:2d:f0:cd:d2:96:13:f8:91:73:2f:07:6d:57:87: 77:bb:d1:e8:ba:72:ae:06:cb:84:72:d8:c1:09:94:d2: 4f:f8:09:d1:43:67:51:51:7d:91:e0:b5:74:94:57:63: 19:2d:10:65:4b:b7:fc:48:8d:63:78:1a:cf:65:fe:5e: ab:42:5f:51:0f:92:f3:31:8f:4d:3c:a8:90:68:92:22: 82:92:29:9b:b5:e2:cd:1f:20:8d:27:4e:56:bf:24:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6f:90:b6:fe:c8:da:f0:82:e3:e9:9c:20:3e:7b:30:de: 37:08:55:33:f8:1e:e0:4c:84:ee:ba:e2:ee:45:f3:16: e5:5d:ae:a3:a1:f6:19:11:4e:02:fb:d5:9f:87:f7:61: 73:12:8f:57:7d:34:b8:9e:50:c2:78:78:dd:81:0a:fe: d6:d3:52:80:f3:09:1a:c4:e4:04:6a:a5:f7:e8:18:4e: 6b:17:4d:f2:46:55:46:85:55:f0:3a:d6:b9:8e:db:ca: 03:b2:0f:37:67:c0:a4:c4:d1:6e:67:83:50:74:1b:e6: ba:98:1e:c1:f6:b5:79:1a:43:dd:28:a3:8c:f9:02:4c Fingerprint (MD5): 1D:42:8D:BA:A7:94:CD:D0:8C:33:95:D9:E2:84:03:13 Fingerprint (SHA1): 6F:A9:B5:1E:52:E8:29:5B:5E:68:68:3F:26:30:10:CB:3E:2E:A8:BD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5238: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5239: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162287 (0x420d36ef) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:23:22 2011 Not After : Tue Nov 08 16:23:22 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:4c:92:e0:9b:53:07:00:43:54:dd:0c:cd:08:48:55: d3:cf:66:e6:4e:3e:ea:7a:5c:05:c1:d0:da:8f:b7:5a: 2a:a3:42:ae:63:9d:41:e3:3d:4e:22:2f:fb:87:91:90: 8b:89:8b:84:40:a7:ac:bc:3a:05:e9:94:39:9d:8a:f5: 20:ac:8f:8f:75:db:92:47:20:9f:37:18:9a:09:39:1b: e2:19:bb:60:4e:e0:e0:67:9a:c3:3e:ea:b6:d7:a4:90: 87:ff:0e:3d:2f:fe:ae:ec:84:09:7c:a3:29:5a:07:bc: 62:83:b6:de:30:a5:70:0f:77:39:d0:a9:59:1a:5b:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 94:9f:90:38:4a:aa:f8:83:ef:a6:8d:b9:a1:9e:3e:fd: 1d:73:cc:9d:54:0f:9b:53:6a:88:e9:80:61:d0:a2:d4: 6e:64:2b:a1:f7:94:97:47:01:a6:83:a8:20:97:c2:bc: f1:45:68:b3:95:37:27:7c:24:10:37:5c:51:bf:e8:80: 10:be:10:f7:26:94:0c:46:77:3c:fd:1b:4e:6a:97:a3: 36:41:db:ed:56:85:86:a2:60:ba:32:07:65:76:e7:90: 96:eb:a6:7e:6d:af:c6:a2:85:df:8e:ca:6d:63:3e:a8: 6c:48:07:3a:e9:40:a8:04:01:51:67:69:85:72:1c:a7 Fingerprint (MD5): 6A:0D:77:4B:5F:D8:A8:5E:2D:D0:AC:14:38:6D:F6:D3 Fingerprint (SHA1): B8:14:D8:DF:A2:3E:90:EB:CB:9C:09:87:3A:66:46:B7:B5:55:D4:93 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #5240: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5241: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162285 (0x420d36ed) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:20 2011 Not After : Tue Nov 08 16:23:20 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:21:ce:89:0c:76:9c:78:44:35:ec:6c:d5:db:7b:1d: 94:e4:9d:c0:60:55:16:6c:43:3d:8c:4a:b3:6b:7a:4e: a4:e7:c1:72:d6:4d:c5:6b:6d:fe:a8:c6:fd:cb:60:40: 49:b3:93:ca:43:df:0c:b5:48:ae:40:56:5d:1e:2e:95: 61:10:f5:ab:4c:2a:d9:5c:27:79:e8:21:6f:af:d9:97: 1e:96:7e:20:3c:5e:e2:7d:7b:b2:e9:53:c5:a2:46:4e: d9:4d:d7:cc:27:52:c4:1c:13:bc:50:65:aa:6f:20:00: b4:71:c1:e0:31:bc:c6:a5:17:86:6a:8e:26:65:9d:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 71:24:8b:44:95:0b:e3:99:f3:3b:36:21:23:77:32:4f: 71:6d:a4:33:9b:db:04:35:a9:f2:ca:ab:a0:f4:1c:7d: 07:b9:42:37:a1:fc:a6:2b:1a:ae:c6:58:64:b9:75:28: 7b:c5:6a:24:aa:59:4e:8d:57:12:04:1b:b8:4b:80:92: b2:80:58:66:7c:39:36:64:15:14:94:7f:6f:f1:8e:c9: 3c:2b:d5:e5:7b:df:64:64:ba:73:3c:2d:c5:8c:bb:5d: cb:f9:63:29:ae:be:64:18:73:2d:01:86:ea:87:7c:c0: 15:b0:d2:d4:fa:67:f5:cd:a4:3f:8e:ea:43:48:1d:0e Fingerprint (MD5): DD:07:A6:38:86:C8:DE:0A:75:83:CC:13:BF:AA:11:7F Fingerprint (SHA1): 80:6F:CB:54:DF:92:E9:FD:35:D9:83:88:6D:FE:3E:4A:09:57:17:F1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5242: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162285 (0x420d36ed) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:20 2011 Not After : Tue Nov 08 16:23:20 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:21:ce:89:0c:76:9c:78:44:35:ec:6c:d5:db:7b:1d: 94:e4:9d:c0:60:55:16:6c:43:3d:8c:4a:b3:6b:7a:4e: a4:e7:c1:72:d6:4d:c5:6b:6d:fe:a8:c6:fd:cb:60:40: 49:b3:93:ca:43:df:0c:b5:48:ae:40:56:5d:1e:2e:95: 61:10:f5:ab:4c:2a:d9:5c:27:79:e8:21:6f:af:d9:97: 1e:96:7e:20:3c:5e:e2:7d:7b:b2:e9:53:c5:a2:46:4e: d9:4d:d7:cc:27:52:c4:1c:13:bc:50:65:aa:6f:20:00: b4:71:c1:e0:31:bc:c6:a5:17:86:6a:8e:26:65:9d:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 71:24:8b:44:95:0b:e3:99:f3:3b:36:21:23:77:32:4f: 71:6d:a4:33:9b:db:04:35:a9:f2:ca:ab:a0:f4:1c:7d: 07:b9:42:37:a1:fc:a6:2b:1a:ae:c6:58:64:b9:75:28: 7b:c5:6a:24:aa:59:4e:8d:57:12:04:1b:b8:4b:80:92: b2:80:58:66:7c:39:36:64:15:14:94:7f:6f:f1:8e:c9: 3c:2b:d5:e5:7b:df:64:64:ba:73:3c:2d:c5:8c:bb:5d: cb:f9:63:29:ae:be:64:18:73:2d:01:86:ea:87:7c:c0: 15:b0:d2:d4:fa:67:f5:cd:a4:3f:8e:ea:43:48:1d:0e Fingerprint (MD5): DD:07:A6:38:86:C8:DE:0A:75:83:CC:13:BF:AA:11:7F Fingerprint (SHA1): 80:6F:CB:54:DF:92:E9:FD:35:D9:83:88:6D:FE:3E:4A:09:57:17:F1 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5243: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162286 (0x420d36ee) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:21 2011 Not After : Tue Nov 08 16:23:21 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a0:30:ac:a2:8c:d2:b6:82:8a:b2:53:20:eb:6b:84: ff:24:55:b8:ff:93:5f:8a:3b:f5:62:9d:fe:c2:ae:8e: 45:b0:2d:f0:cd:d2:96:13:f8:91:73:2f:07:6d:57:87: 77:bb:d1:e8:ba:72:ae:06:cb:84:72:d8:c1:09:94:d2: 4f:f8:09:d1:43:67:51:51:7d:91:e0:b5:74:94:57:63: 19:2d:10:65:4b:b7:fc:48:8d:63:78:1a:cf:65:fe:5e: ab:42:5f:51:0f:92:f3:31:8f:4d:3c:a8:90:68:92:22: 82:92:29:9b:b5:e2:cd:1f:20:8d:27:4e:56:bf:24:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6f:90:b6:fe:c8:da:f0:82:e3:e9:9c:20:3e:7b:30:de: 37:08:55:33:f8:1e:e0:4c:84:ee:ba:e2:ee:45:f3:16: e5:5d:ae:a3:a1:f6:19:11:4e:02:fb:d5:9f:87:f7:61: 73:12:8f:57:7d:34:b8:9e:50:c2:78:78:dd:81:0a:fe: d6:d3:52:80:f3:09:1a:c4:e4:04:6a:a5:f7:e8:18:4e: 6b:17:4d:f2:46:55:46:85:55:f0:3a:d6:b9:8e:db:ca: 03:b2:0f:37:67:c0:a4:c4:d1:6e:67:83:50:74:1b:e6: ba:98:1e:c1:f6:b5:79:1a:43:dd:28:a3:8c:f9:02:4c Fingerprint (MD5): 1D:42:8D:BA:A7:94:CD:D0:8C:33:95:D9:E2:84:03:13 Fingerprint (SHA1): 6F:A9:B5:1E:52:E8:29:5B:5E:68:68:3F:26:30:10:CB:3E:2E:A8:BD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5244: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162286 (0x420d36ee) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:23:21 2011 Not After : Tue Nov 08 16:23:21 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a0:30:ac:a2:8c:d2:b6:82:8a:b2:53:20:eb:6b:84: ff:24:55:b8:ff:93:5f:8a:3b:f5:62:9d:fe:c2:ae:8e: 45:b0:2d:f0:cd:d2:96:13:f8:91:73:2f:07:6d:57:87: 77:bb:d1:e8:ba:72:ae:06:cb:84:72:d8:c1:09:94:d2: 4f:f8:09:d1:43:67:51:51:7d:91:e0:b5:74:94:57:63: 19:2d:10:65:4b:b7:fc:48:8d:63:78:1a:cf:65:fe:5e: ab:42:5f:51:0f:92:f3:31:8f:4d:3c:a8:90:68:92:22: 82:92:29:9b:b5:e2:cd:1f:20:8d:27:4e:56:bf:24:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 6f:90:b6:fe:c8:da:f0:82:e3:e9:9c:20:3e:7b:30:de: 37:08:55:33:f8:1e:e0:4c:84:ee:ba:e2:ee:45:f3:16: e5:5d:ae:a3:a1:f6:19:11:4e:02:fb:d5:9f:87:f7:61: 73:12:8f:57:7d:34:b8:9e:50:c2:78:78:dd:81:0a:fe: d6:d3:52:80:f3:09:1a:c4:e4:04:6a:a5:f7:e8:18:4e: 6b:17:4d:f2:46:55:46:85:55:f0:3a:d6:b9:8e:db:ca: 03:b2:0f:37:67:c0:a4:c4:d1:6e:67:83:50:74:1b:e6: ba:98:1e:c1:f6:b5:79:1a:43:dd:28:a3:8c:f9:02:4c Fingerprint (MD5): 1D:42:8D:BA:A7:94:CD:D0:8C:33:95:D9:E2:84:03:13 Fingerprint (SHA1): 6F:A9:B5:1E:52:E8:29:5B:5E:68:68:3F:26:30:10:CB:3E:2E:A8:BD Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5245: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162287 (0x420d36ef) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:23:22 2011 Not After : Tue Nov 08 16:23:22 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:4c:92:e0:9b:53:07:00:43:54:dd:0c:cd:08:48:55: d3:cf:66:e6:4e:3e:ea:7a:5c:05:c1:d0:da:8f:b7:5a: 2a:a3:42:ae:63:9d:41:e3:3d:4e:22:2f:fb:87:91:90: 8b:89:8b:84:40:a7:ac:bc:3a:05:e9:94:39:9d:8a:f5: 20:ac:8f:8f:75:db:92:47:20:9f:37:18:9a:09:39:1b: e2:19:bb:60:4e:e0:e0:67:9a:c3:3e:ea:b6:d7:a4:90: 87:ff:0e:3d:2f:fe:ae:ec:84:09:7c:a3:29:5a:07:bc: 62:83:b6:de:30:a5:70:0f:77:39:d0:a9:59:1a:5b:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: OID.2.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 94:9f:90:38:4a:aa:f8:83:ef:a6:8d:b9:a1:9e:3e:fd: 1d:73:cc:9d:54:0f:9b:53:6a:88:e9:80:61:d0:a2:d4: 6e:64:2b:a1:f7:94:97:47:01:a6:83:a8:20:97:c2:bc: f1:45:68:b3:95:37:27:7c:24:10:37:5c:51:bf:e8:80: 10:be:10:f7:26:94:0c:46:77:3c:fd:1b:4e:6a:97:a3: 36:41:db:ed:56:85:86:a2:60:ba:32:07:65:76:e7:90: 96:eb:a6:7e:6d:af:c6:a2:85:df:8e:ca:6d:63:3e:a8: 6c:48:07:3a:e9:40:a8:04:01:51:67:69:85:72:1c:a7 Fingerprint (MD5): 6A:0D:77:4B:5F:D8:A8:5E:2D:D0:AC:14:38:6D:F6:D3 Fingerprint (SHA1): B8:14:D8:DF:A2:3E:90:EB:CB:9C:09:87:3A:66:46:B7:B5:55:D4:93 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5246: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162287 (0x420d36ef) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:23:22 2011 Not After : Tue Nov 08 16:23:22 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:4c:92:e0:9b:53:07:00:43:54:dd:0c:cd:08:48:55: d3:cf:66:e6:4e:3e:ea:7a:5c:05:c1:d0:da:8f:b7:5a: 2a:a3:42:ae:63:9d:41:e3:3d:4e:22:2f:fb:87:91:90: 8b:89:8b:84:40:a7:ac:bc:3a:05:e9:94:39:9d:8a:f5: 20:ac:8f:8f:75:db:92:47:20:9f:37:18:9a:09:39:1b: e2:19:bb:60:4e:e0:e0:67:9a:c3:3e:ea:b6:d7:a4:90: 87:ff:0e:3d:2f:fe:ae:ec:84:09:7c:a3:29:5a:07:bc: 62:83:b6:de:30:a5:70:0f:77:39:d0:a9:59:1a:5b:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 94:9f:90:38:4a:aa:f8:83:ef:a6:8d:b9:a1:9e:3e:fd: 1d:73:cc:9d:54:0f:9b:53:6a:88:e9:80:61:d0:a2:d4: 6e:64:2b:a1:f7:94:97:47:01:a6:83:a8:20:97:c2:bc: f1:45:68:b3:95:37:27:7c:24:10:37:5c:51:bf:e8:80: 10:be:10:f7:26:94:0c:46:77:3c:fd:1b:4e:6a:97:a3: 36:41:db:ed:56:85:86:a2:60:ba:32:07:65:76:e7:90: 96:eb:a6:7e:6d:af:c6:a2:85:df:8e:ca:6d:63:3e:a8: 6c:48:07:3a:e9:40:a8:04:01:51:67:69:85:72:1c:a7 Fingerprint (MD5): 6A:0D:77:4B:5F:D8:A8:5E:2D:D0:AC:14:38:6D:F6:D3 Fingerprint (SHA1): B8:14:D8:DF:A2:3E:90:EB:CB:9C:09:87:3A:66:46:B7:B5:55:D4:93 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #5247: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5248: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162290 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5249: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5250: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5251: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5252: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1108162291 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5253: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #5254: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5255: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5256: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108162292 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5257: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5258: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5259: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5260: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1108162293 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5261: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der chains.sh: #5262: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #5263: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5264: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1108162294 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5265: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der chains.sh: #5266: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #5267: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5268: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1108162295 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5269: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der chains.sh: #5270: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #5271: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5272: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1108162296 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5273: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der chains.sh: #5274: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5275: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #5276: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #5277: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5278: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #5279: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162290 (0x420d36f2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:27 2011 Not After : Tue Nov 08 16:23:27 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:e3:5c:69:a2:c8:66:0e:00:54:b9:95:a3:5c:7e:49: 87:95:ca:90:b1:1e:3d:12:d0:ce:a3:c5:23:73:d2:10: 32:65:32:b8:b7:b2:ec:cf:80:fa:1c:27:9b:65:3a:e6: d1:e9:68:eb:a4:42:55:58:c7:01:ab:78:cf:00:3a:f2: 2c:a0:1c:eb:93:cd:03:4d:34:69:58:f9:de:c3:ce:4b: 3e:e3:e6:29:bf:30:96:3d:59:b0:07:bd:d5:c9:83:59: 97:1a:c9:2e:c5:7f:49:d2:df:3c:cd:54:fb:27:03:cd: 5b:bb:a6:19:18:89:f0:a0:12:4e:17:0c:f5:51:70:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0e:f0:59:8a:02:09:38:03:49:41:ec:64:84:30:c6:7d: 62:fe:b5:97:5b:57:11:b4:5a:05:91:83:c0:0d:63:a0: a0:fe:88:43:bc:95:9f:ab:fb:84:6c:70:b4:3f:2d:3e: b1:6d:bb:09:4a:fc:ed:eb:13:69:96:e3:b5:2b:55:0b: 59:ac:b0:95:4e:28:c4:04:51:3f:5f:7e:08:51:94:7d: 40:c2:82:2c:fe:76:b2:6f:e0:19:62:07:83:7c:8e:36: 88:f2:36:df:07:30:18:ef:42:f7:cf:c8:f5:61:25:72: 1b:0c:47:e2:55:b7:bd:b7:1a:5c:f3:15:60:1e:1b:c3 Fingerprint (MD5): FE:2A:B7:3E:28:F7:D1:79:71:6A:D5:A9:8B:09:0C:4B Fingerprint (SHA1): A5:ED:87:7B:7D:B3:B8:B0:0F:99:55:FC:66:B3:DC:E6:B2:D4:4E:C6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5280: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5281: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5282: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5283: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162290 (0x420d36f2) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:27 2011 Not After : Tue Nov 08 16:23:27 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:e3:5c:69:a2:c8:66:0e:00:54:b9:95:a3:5c:7e:49: 87:95:ca:90:b1:1e:3d:12:d0:ce:a3:c5:23:73:d2:10: 32:65:32:b8:b7:b2:ec:cf:80:fa:1c:27:9b:65:3a:e6: d1:e9:68:eb:a4:42:55:58:c7:01:ab:78:cf:00:3a:f2: 2c:a0:1c:eb:93:cd:03:4d:34:69:58:f9:de:c3:ce:4b: 3e:e3:e6:29:bf:30:96:3d:59:b0:07:bd:d5:c9:83:59: 97:1a:c9:2e:c5:7f:49:d2:df:3c:cd:54:fb:27:03:cd: 5b:bb:a6:19:18:89:f0:a0:12:4e:17:0c:f5:51:70:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 0e:f0:59:8a:02:09:38:03:49:41:ec:64:84:30:c6:7d: 62:fe:b5:97:5b:57:11:b4:5a:05:91:83:c0:0d:63:a0: a0:fe:88:43:bc:95:9f:ab:fb:84:6c:70:b4:3f:2d:3e: b1:6d:bb:09:4a:fc:ed:eb:13:69:96:e3:b5:2b:55:0b: 59:ac:b0:95:4e:28:c4:04:51:3f:5f:7e:08:51:94:7d: 40:c2:82:2c:fe:76:b2:6f:e0:19:62:07:83:7c:8e:36: 88:f2:36:df:07:30:18:ef:42:f7:cf:c8:f5:61:25:72: 1b:0c:47:e2:55:b7:bd:b7:1a:5c:f3:15:60:1e:1b:c3 Fingerprint (MD5): FE:2A:B7:3E:28:F7:D1:79:71:6A:D5:A9:8B:09:0C:4B Fingerprint (SHA1): A5:ED:87:7B:7D:B3:B8:B0:0F:99:55:FC:66:B3:DC:E6:B2:D4:4E:C6 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5284: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5285: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #5286: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162297 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5287: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #5288: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5289: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5290: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1108162298 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5291: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der chains.sh: #5292: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #5293: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1108162299 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5295: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der chains.sh: #5296: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #5297: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1108162300 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5299: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der chains.sh: #5300: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5301: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5302: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1108162301 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5303: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der chains.sh: #5304: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #5305: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1108162302 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5307: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der chains.sh: #5308: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #5309: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1108162303 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5311: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der chains.sh: #5312: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5313: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5314: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1108162304 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5315: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der chains.sh: #5316: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #5317: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1108162305 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5319: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der chains.sh: #5320: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #5321: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1108162306 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5323: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der chains.sh: #5324: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5325: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5326: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1108162307 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5327: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der chains.sh: #5328: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #5329: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1108162308 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5331: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der chains.sh: #5332: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #5333: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1108162309 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5335: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der chains.sh: #5336: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5337: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5338: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1108162310 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5339: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der chains.sh: #5340: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #5341: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1108162311 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5343: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der chains.sh: #5344: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #5345: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5346: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1108162312 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5347: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der chains.sh: #5348: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #5349: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5350: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1108162313 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5351: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der chains.sh: #5352: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #5353: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5354: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1108162314 --extCP --extIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #5355: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der chains.sh: #5356: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #5357: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1108162315 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5359: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der chains.sh: #5360: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #5361: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5362: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1108162316 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5363: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der chains.sh: #5364: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #5365: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1108162317 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5367: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der chains.sh: #5368: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #5369: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5370: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1108162318 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5371: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der chains.sh: #5372: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #5373: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1108162319 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5375: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der chains.sh: #5376: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #5377: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5378: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1108162320 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5379: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der chains.sh: #5380: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #5381: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5382: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1108162321 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5383: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der chains.sh: #5384: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #5385: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5386: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1108162322 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5387: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der chains.sh: #5388: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #5389: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5390: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1108162323 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5391: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der chains.sh: #5392: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #5393: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5394: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1108162324 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5395: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der chains.sh: #5396: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #5397: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5398: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1108162325 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5399: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der chains.sh: #5400: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #5401: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5402: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1108162326 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5403: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der chains.sh: #5404: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5405: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5406: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5407: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5408: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5409: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5410: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5411: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5412: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5413: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5414: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5415: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5416: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5417: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5418: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5419: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5420: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5421: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5422: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5423: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5424: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5425: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5426: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5427: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162297 (0x420d36f9) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Tue Nov 08 16:23:34 2011 Not After : Tue Nov 08 16:23:34 2061 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:6d:2c:bb:74:20:aa:7f:f2:20:a5:03:df:ab:89:9b: 83:e7:7e:13:f4:57:b8:5f:89:7c:c1:d5:71:84:6f:30: 54:82:0e:37:13:88:1a:be:80:7f:4d:48:6f:4d:8d:c5: 24:cf:a8:49:ee:b7:f2:99:7b:1c:85:80:fc:d8:19:c6: ec:a6:35:cb:e3:17:75:34:f0:83:3a:78:e6:af:bd:fc: 5a:e0:c4:10:45:e2:6d:b7:1b:ef:d7:ad:47:1a:7b:b3: f2:c4:3e:7b:37:bd:d0:a2:e0:a4:38:62:d9:dc:85:15: e2:86:a9:b9:83:9c:f5:e2:e1:cf:3e:9c:78:8d:93:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 2f:b0:08:6b:88:2c:54:ad:87:b9:8e:38:d8:3c:cd:64: 01:7c:e8:e4:ed:85:1d:92:73:d0:9d:0e:48:49:62:29: 75:35:5b:28:0c:ea:5d:07:67:90:d9:39:85:ba:84:f9: 41:fe:14:7c:4a:51:e2:16:ae:8f:27:90:6c:fd:73:b1: c3:3b:22:77:22:53:bc:3b:0b:13:81:09:83:05:13:55: 6a:dc:80:26:11:0b:b6:2e:ad:e8:1e:3d:75:a9:6f:6d: 53:18:ca:0f:db:e5:87:60:a1:f3:24:a9:a3:7c:3e:39: 80:49:91:e8:ab:5c:f9:da:f2:d3:61:0c:e7:60:a4:c1 Fingerprint (MD5): 66:69:DA:0F:F4:AB:45:07:B6:F6:0D:2E:59:CE:A7:55 Fingerprint (SHA1): 36:0D:DF:58:30:FA:3D:B4:BC:4A:34:19:69:D6:71:C3:E2:D2:35:08 Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #5428: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5429: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5430: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162327 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5431: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5432: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #5433: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5434: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1108162328 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5435: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der chains.sh: #5436: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #5437: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5438: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1108162329 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5439: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der chains.sh: #5440: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #5441: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5442: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1108162330 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5443: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der chains.sh: #5444: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #5445: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5446: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1108162331 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5447: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der chains.sh: #5448: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #5449: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5450: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1108162332 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5451: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der chains.sh: #5452: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #5453: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5454: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1108162333 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5455: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der chains.sh: #5456: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5457: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162327 (0x420d3717) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:04 2011 Not After : Tue Nov 08 16:24:04 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:36:38:c3:89:03:c5:23:a7:b0:a3:78:ac:95:f2:76: 93:43:2b:1c:b5:41:12:8d:35:b3:47:bf:8b:ab:f0:2b: f8:0d:12:6a:88:67:78:fa:79:93:c2:81:e0:a1:8c:45: 28:a1:17:7b:16:03:03:79:87:4e:6f:96:2b:32:c5:77: 4a:b6:cc:de:df:29:4b:8c:4b:3a:ee:69:33:00:7e:d6: 8e:d3:c4:6a:ac:58:e8:d5:9d:1d:9b:d8:ea:a8:be:15: 73:9b:06:f0:b1:97:a9:50:79:53:ef:2f:e6:c6:f1:48: 0d:a7:08:5c:eb:d6:e7:c5:b7:86:cf:8c:90:68:b7:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:ff:e8:56:30:ed:4a:27:13:c5:7e:f4:8c:74:96:8c: 6c:b9:b7:dd:7e:8e:ef:71:ae:40:1d:3b:31:7b:bf:d7: 0a:01:84:69:5e:c0:bb:55:21:07:7a:c0:a6:8d:04:a5: a5:73:a5:26:d0:9f:60:cc:49:93:33:54:2e:7b:22:83: fc:21:c6:ad:ff:e6:24:f0:30:4a:4c:15:fd:42:1f:a1: eb:87:f6:2b:72:b9:b0:0f:ea:b8:de:f0:cc:e8:bb:c7: 89:44:3c:d9:14:f9:42:86:4b:0b:0d:44:a6:4b:6a:13: 75:79:16:48:3e:b7:92:76:6b:71:92:b1:45:56:9d:17 Fingerprint (MD5): 8E:45:45:D5:0A:0F:A6:AD:17:15:85:3F:AC:B0:DD:44 Fingerprint (SHA1): D7:C8:71:72:A4:CE:D2:BE:D3:2D:29:48:C0:DF:13:F5:D8:34:6E:85 Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5458: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5459: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5460: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5461: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162327 (0x420d3717) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:04 2011 Not After : Tue Nov 08 16:24:04 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:36:38:c3:89:03:c5:23:a7:b0:a3:78:ac:95:f2:76: 93:43:2b:1c:b5:41:12:8d:35:b3:47:bf:8b:ab:f0:2b: f8:0d:12:6a:88:67:78:fa:79:93:c2:81:e0:a1:8c:45: 28:a1:17:7b:16:03:03:79:87:4e:6f:96:2b:32:c5:77: 4a:b6:cc:de:df:29:4b:8c:4b:3a:ee:69:33:00:7e:d6: 8e:d3:c4:6a:ac:58:e8:d5:9d:1d:9b:d8:ea:a8:be:15: 73:9b:06:f0:b1:97:a9:50:79:53:ef:2f:e6:c6:f1:48: 0d:a7:08:5c:eb:d6:e7:c5:b7:86:cf:8c:90:68:b7:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 21:ff:e8:56:30:ed:4a:27:13:c5:7e:f4:8c:74:96:8c: 6c:b9:b7:dd:7e:8e:ef:71:ae:40:1d:3b:31:7b:bf:d7: 0a:01:84:69:5e:c0:bb:55:21:07:7a:c0:a6:8d:04:a5: a5:73:a5:26:d0:9f:60:cc:49:93:33:54:2e:7b:22:83: fc:21:c6:ad:ff:e6:24:f0:30:4a:4c:15:fd:42:1f:a1: eb:87:f6:2b:72:b9:b0:0f:ea:b8:de:f0:cc:e8:bb:c7: 89:44:3c:d9:14:f9:42:86:4b:0b:0d:44:a6:4b:6a:13: 75:79:16:48:3e:b7:92:76:6b:71:92:b1:45:56:9d:17 Fingerprint (MD5): 8E:45:45:D5:0A:0F:A6:AD:17:15:85:3F:AC:B0:DD:44 Fingerprint (SHA1): D7:C8:71:72:A4:CE:D2:BE:D3:2D:29:48:C0:DF:13:F5:D8:34:6E:85 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #5462: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5463: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5464: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5465: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162334 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5466: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5467: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5468: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5469: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108162335 --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5470: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5471: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5472: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5473: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108162336 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5474: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5475: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5476: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5477: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1108162337 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5478: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #5479: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5480: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5481: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5482: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5483: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162334 (0x420d371e) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:11 2011 Not After : Tue Nov 08 16:24:11 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:b9:43:95:1d:51:5e:95:1d:74:be:fd:38:76:e1:74: eb:85:f4:6c:26:46:d0:19:8a:94:da:44:7c:4d:db:c9: 97:67:21:bd:d5:59:6f:68:23:f3:7f:4d:19:0d:93:4f: 17:7a:67:4d:eb:43:25:1f:d9:89:2c:4a:87:39:ce:d2: 2f:6b:d6:be:aa:09:cf:68:0b:ee:38:07:7f:6d:8c:15: de:9d:ec:ae:dd:3a:e3:7a:5c:b6:3c:af:7c:03:06:38: 3f:b6:7d:25:45:dd:26:93:f0:3b:bb:fe:45:11:5e:07: 28:af:c1:4e:cf:61:78:a8:2e:71:da:00:c1:97:00:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 76:f3:4d:ef:84:1a:1c:7d:48:1f:9a:6e:2c:39:59:e8: 49:42:5f:a3:15:32:67:b0:2e:e7:28:89:0a:48:30:10: 94:0d:a3:42:fa:31:7d:de:c0:7d:11:36:11:65:ce:e7: 66:9d:be:df:5c:14:f8:73:90:1d:8d:be:64:89:01:7a: cb:b2:bc:36:f2:3d:53:cc:d6:52:b8:0e:99:70:7e:cd: cd:4b:47:4f:c2:73:2c:e5:71:b3:5e:c4:49:0a:05:42: ef:42:58:94:46:b6:c3:6c:db:03:df:21:0b:59:57:7c: 07:60:c8:a9:6c:84:de:e5:dd:82:3d:0f:e8:6d:b8:b9 Fingerprint (MD5): 25:D6:38:03:70:F4:45:DC:D8:7D:D1:23:99:1D:9D:00 Fingerprint (SHA1): 21:AA:34:83:3F:B0:66:8E:C6:6F:94:CE:E6:B5:B7:71:3B:FB:83:55 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5484: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5485: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5486: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162335 (0x420d371f) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:12 2011 Not After : Tue Nov 08 16:24:12 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:74:15:bb:af:b3:12:d5:d1:48:9b:41:00:ca:ae:e4: 1c:3a:6d:b9:04:22:f9:76:3f:37:fc:37:b9:84:10:9b: 08:23:12:fc:67:5a:f7:76:4d:f4:75:33:c3:3c:96:81: d6:74:1c:1b:30:b9:f5:4e:0c:d2:7b:50:53:f6:af:13: f9:32:9b:0c:d5:1c:53:03:b2:64:6c:90:6c:4b:14:d9: b5:91:50:61:c4:66:52:1b:85:aa:b7:a7:a2:ed:35:a4: a4:14:25:7c:6b:c3:86:b3:69:d5:67:83:00:72:bc:bd: 64:80:9b:54:d8:4e:cd:46:56:00:52:18:23:d4:17:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: bc:af:e7:b4:0a:7f:30:73:da:c1:3d:2e:2e:c9:9e:82: 1b:f8:f3:88:84:2c:5c:a5:b4:a3:a7:3f:25:78:d9:20: 86:0b:47:5b:80:cb:d1:66:af:6f:b8:1b:d6:1e:47:58: 9f:a6:ed:79:cb:cc:9d:ed:59:2d:e9:0d:4a:72:42:fb: 5d:4d:61:30:34:81:b9:d3:50:ae:7a:c1:39:82:ab:6f: b4:46:f6:4c:9c:9c:1c:dd:4d:8d:d3:85:92:37:ed:c0: 7b:2b:aa:15:67:3f:8a:cb:f2:69:4c:15:de:e9:30:a3: 59:e6:87:72:c4:8b:22:9c:f8:de:06:55:cd:9b:3a:6d Fingerprint (MD5): 94:DD:F0:B4:D1:6A:37:5A:DF:6C:70:8B:B4:D9:A7:9A Fingerprint (SHA1): 01:D9:7A:68:20:87:EA:A3:AF:93:57:E5:8F:E3:3F:A0:4D:BC:FF:DE Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5487: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5488: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162336 (0x420d3720) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:24:13 2011 Not After : Tue Nov 08 16:24:13 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:b5:a1:ac:29:96:80:1f:c4:44:38:ca:90:7f:00:b1: b1:e5:59:c8:99:47:13:e4:38:f4:d3:62:da:ed:3c:67: 22:f8:bd:3f:13:7e:02:87:d5:89:c0:ec:07:1f:ec:f5: f6:0b:54:a6:33:a2:64:22:bb:03:cc:83:10:d8:77:94: 2f:50:d8:bb:78:02:c5:dd:b7:30:17:d4:6f:a3:0e:7f: 3f:96:f7:9a:ea:b8:84:9a:d3:de:53:09:79:22:a9:fc: 69:0e:b5:49:ed:ea:40:2d:75:3c:41:62:c6:fe:88:d1: 40:8c:59:f0:c8:d9:eb:a5:65:ae:c8:32:45:e2:6d:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 18:24:15:30:b1:cd:20:32:20:80:dd:cc:22:75:56:94: ec:b6:7d:7f:35:a6:3a:c7:f8:5d:d7:52:6a:aa:3e:00: 77:6d:72:e9:63:d1:74:b9:d6:71:be:b9:1a:d3:e8:6e: d3:85:03:01:37:4d:a4:52:ad:ec:fc:d6:1f:40:12:be: 09:0f:3d:49:4f:45:e4:af:c0:54:74:ab:d6:50:e9:df: 89:32:93:94:0d:df:f0:4f:c7:04:ac:5b:47:cb:aa:d0: c6:9a:83:34:36:da:66:7d:55:f4:0a:d8:c6:dd:44:ff: 56:f3:8b:63:0c:59:98:6c:82:5a:6d:33:4d:21:43:cf Fingerprint (MD5): BA:50:CC:FA:B2:27:CF:FB:DF:B1:18:46:30:D3:12:58 Fingerprint (SHA1): DF:21:C9:E1:DB:28:91:07:F8:F6:F3:BE:3B:CE:78:22:E3:F6:08:56 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #5489: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5490: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162338 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5491: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5492: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5493: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5494: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108162339 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5495: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5496: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5497: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5498: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108162340 --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5499: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5500: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5501: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5502: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1108162341 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5503: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der chains.sh: #5504: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5505: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5506: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1108162342 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5507: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der chains.sh: #5508: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5509: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5510: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #5511: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #5512: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #5513: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162338 (0x420d3722) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:16 2011 Not After : Tue Nov 08 16:24:16 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:6f:24:08:82:5d:68:a7:bd:02:70:ec:ba:e5:7f:f9: 4e:05:8f:2b:e3:06:01:c4:b9:a5:59:51:a7:f4:71:36: 01:20:96:9a:6b:3b:f4:dd:63:21:b1:2e:1e:83:2a:ef: c4:86:a9:d8:84:a1:c7:05:78:96:61:bc:7b:11:6a:ba: fb:63:b5:5c:dd:69:f5:67:1d:ec:da:1b:06:35:ee:9b: bb:e5:14:c9:5e:29:b2:eb:38:56:b2:6a:4b:38:f7:1c: 37:a3:8f:ce:f2:9e:d9:a4:0f:88:65:16:ad:f6:3e:1f: d6:8c:ca:16:fe:25:66:48:5e:ab:70:ff:f1:47:73:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 41:87:80:8c:cb:54:c7:76:0c:ec:7b:33:1a:e9:4b:a2: af:c7:0f:34:a5:08:59:5f:ce:a4:af:14:82:34:62:a2: 1c:3d:37:c4:7d:4f:60:1b:59:10:99:2e:c3:3d:dc:49: 50:33:c2:df:86:a4:66:c9:69:5c:0e:56:35:d2:be:e4: d7:94:ea:69:8c:13:54:b2:b8:a9:9c:aa:85:4c:55:c3: a0:ad:5e:5b:2f:b6:f3:f6:c2:c5:55:33:75:0a:ef:34: c8:31:70:c2:ed:19:eb:d2:e5:1b:ae:08:63:1a:35:40: 2c:7a:4b:b7:18:06:0f:bd:23:d2:35:9b:40:5f:5e:ed Fingerprint (MD5): 4A:AB:90:FC:1E:D2:51:33:6F:C6:DA:63:53:3F:F9:CF Fingerprint (SHA1): 3C:41:6F:B7:30:06:EB:06:EF:FD:37:E3:09:A9:B1:B5:99:3A:3A:5D Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5514: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5515: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162339 (0x420d3723) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:17 2011 Not After : Tue Nov 08 16:24:17 2016 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:83:05:b1:7a:3d:f8:0d:4b:a5:38:0f:2d:59:57:80: 41:24:94:e2:d1:95:81:42:54:f9:58:59:ec:a6:e6:34: 9d:dc:a0:68:74:26:c7:6c:2a:ca:cb:69:5c:a7:62:11: d7:93:53:c4:15:02:37:ce:23:d9:9f:a8:46:60:62:84: 48:59:13:fd:42:d9:5a:42:ec:a8:d9:00:86:29:91:9d: 82:ff:f4:df:7d:99:66:5a:a7:ac:11:e2:08:2d:d6:17: 97:89:c6:9d:b4:ac:16:11:b7:b9:a6:0a:6a:3b:1d:81: 30:cb:57:b8:f6:61:d1:68:48:54:3f:09:e6:99:9a:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: aa:4d:93:33:de:d5:a2:44:24:c6:45:b4:58:95:45:f2: de:20:ba:ae:27:7f:74:8d:dc:81:10:f2:79:d6:36:e2: db:11:11:45:f2:ec:46:13:02:b1:bd:ee:db:bf:c6:a7: e3:89:d1:3e:06:5a:b3:e5:77:36:01:f4:48:c5:5a:19: 08:5c:90:52:fb:af:cf:4c:a8:ce:1a:09:1f:2c:61:25: c6:46:a3:6a:dd:b1:8b:ce:11:9b:ce:17:18:d9:22:8e: d9:07:b8:e8:db:66:22:d2:93:f2:0b:f5:05:42:0d:b9: a8:84:b3:1e:c7:4e:8b:2c:06:3f:5e:21:0e:c4:0f:8c Fingerprint (MD5): 5D:17:45:0C:EB:D5:E0:98:08:5C:9B:BD:E8:31:0B:AC Fingerprint (SHA1): 06:42:EC:B0:1F:80:9F:44:7A:BE:F0:85:8A:C1:18:EF:AA:83:7B:29 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5516: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5517: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5518: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162340 (0x420d3724) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Tue Nov 08 16:24:18 2011 Not After : Tue Nov 08 16:24:18 2016 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:05:92:7b:05:0f:0f:86:f7:eb:fc:6f:64:0f:77:92: ea:62:8c:6a:db:73:b7:f0:53:8c:10:9a:9c:41:38:65: 9e:4b:65:62:43:93:f8:5c:45:24:7f:84:e5:c1:ef:d9: 07:24:b5:58:fb:7e:41:41:96:0c:4a:2c:ab:a1:ab:87: 57:5d:a1:f4:9c:39:74:3e:60:ff:8c:3f:c1:06:a9:74: 07:d8:b8:79:73:65:c9:e4:53:1b:64:9b:a1:41:a3:43: 00:de:32:9a:34:8b:ae:92:40:c4:d7:72:7d:4c:2d:64: d6:e8:64:0d:84:b1:82:46:a0:68:e5:c2:41:14:18:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { OID.1.0 User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: OID.1.0 Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: ae:8a:a9:d3:ff:63:bb:9c:d3:40:e0:4e:d2:cb:dc:5d: 59:61:29:f1:ef:11:bf:ad:f8:97:17:5e:7f:cd:df:05: 29:26:b9:da:84:67:49:34:00:ec:b9:0b:5f:ea:8c:7c: 86:03:4b:ee:98:a3:b1:80:cb:0e:01:97:0a:87:53:7f: 32:dc:23:32:6f:aa:4d:5f:33:51:98:83:06:01:8c:a6: ec:49:e5:51:11:22:23:95:33:52:05:3b:f2:43:b3:02: f1:95:3a:b0:30:27:09:59:4d:06:8a:07:3d:d4:96:5d: e5:e2:cf:7d:3a:6e:b5:3e:48:d6:6d:30:5e:1f:4c:c9 Fingerprint (MD5): 8A:E8:B8:3D:EA:64:F5:C0:F3:11:D9:96:6D:E2:2B:3A Fingerprint (SHA1): B8:CF:36:02:6E:16:C0:8F:04:91:CE:26:D6:BE:82:0E:E6:4F:D6:39 Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5519: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5520: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162343 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5521: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5522: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5523: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5524: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108162344 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5525: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5526: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5527: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5528: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1108162345 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-CA1Root-1108162253.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5529: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der chains.sh: #5530: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #5531: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5532: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1108162346 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5533: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der chains.sh: #5534: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #5535: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -t Root.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5536: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162347 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5537: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5538: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5539: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162348 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5540: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5541: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5542: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5543: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1108162349 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5544: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #5545: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1108162350 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5546: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #5547: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5548: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5549: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5550: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1108162351 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-Bridge-1108162254.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5551: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #5552: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5553: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5554: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108162352 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5555: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5556: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5557: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5558: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162353 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5559: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5560: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5561: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162354 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5562: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5563: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5564: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5565: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1108162355 -7 Bridge@Army < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5566: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der chains.sh: #5567: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1108162356 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5568: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der chains.sh: #5569: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #5570: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5571: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5572: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1108162357 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-Bridge-1108162255.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5573: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #5574: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5575: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5576: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108162358 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5577: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5578: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5579: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5580: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1108162359 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-BridgeNavy-1108162256.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5581: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #5582: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5583: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5584: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1108162360 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5585: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #5586: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #5587: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -t Army.der - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #5588: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162361 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5589: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #5590: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #5591: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162362 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5592: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #5593: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #5594: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5595: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1108162363 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5596: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der chains.sh: #5597: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #5598: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5599: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1108162364 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5600: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der chains.sh: #5601: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #5602: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5603: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1108162365 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5604: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der chains.sh: #5605: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1108162366 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #5606: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der chains.sh: #5607: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #5608: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5609: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5610: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1108162367 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5611: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der chains.sh: #5612: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5613: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5614: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1108162368 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5615: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der chains.sh: #5616: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5617: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5618: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108162369 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5619: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5620: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5621: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5622: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1108162370 --extCP < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #5623: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #5624: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162361 (0x420d3739) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Tue Nov 08 16:24:36 2011 Not After : Tue Nov 08 16:24:36 2061 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:56:30:24:6b:f9:e9:49:4d:60:0b:f0:88:1c:6c:a0: 4a:3b:5a:4d:6f:57:86:82:b9:98:1e:12:6a:71:5c:5a: 4b:46:87:9f:82:11:2e:dc:64:69:ce:b5:31:71:68:23: 38:25:78:e2:b6:28:17:46:cf:6a:54:f2:88:bd:6f:a8: 80:41:4a:bd:b7:46:af:d3:5b:86:67:6d:6f:30:da:3b: 70:57:b5:73:83:53:8e:68:52:f4:a6:45:06:70:7b:3f: 7b:f8:0f:25:96:79:f1:c0:ae:79:ba:ea:a6:5f:c7:ee: 21:57:4d:ce:01:c0:ea:ec:1c:ac:de:6f:af:d2:37:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: a8:f5:da:e6:7e:c2:a5:f3:d0:92:fa:4a:47:9d:f4:61: 76:f4:77:23:30:66:bc:d1:bc:f7:b5:88:cf:5a:67:48: bb:25:fa:50:d4:bc:7e:25:c9:9f:ad:cb:d4:06:99:2a: 81:17:69:ea:1c:5a:01:c0:c1:8c:07:c3:a9:4e:43:52: e0:21:66:6d:17:06:fa:33:72:92:2b:bb:ca:41:01:5e: d0:a6:51:ea:fa:a6:e3:29:40:af:93:13:a5:3e:9c:39: a9:e5:ec:9b:61:5c:b0:4e:a5:f6:2c:e9:72:19:c0:2a: 4d:6c:1d:c1:80:de:35:27:b6:cd:17:f8:a6:2a:41:9c Fingerprint (MD5): 17:6C:31:F6:7F:E2:FA:5C:F7:C9:13:98:90:95:21:83 Fingerprint (SHA1): 57:B0:26:E0:7A:AE:03:AD:78:3E:90:D5:15:0D:77:DC:EB:77:C0:A9 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #5626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5628: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5629: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5630: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5631: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5632: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5633: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5634: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162362 (0x420d373a) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Tue Nov 08 16:24:38 2011 Not After : Tue Nov 08 16:24:38 2061 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:08:61:de:0c:6f:e8:7d:f5:a1:02:50:a2:86:c4:80: f5:24:dd:fa:fe:79:ab:e5:27:91:eb:da:db:88:ea:a0: f3:be:ad:25:f4:72:c8:16:71:24:d4:4e:3a:31:9c:1a: 4c:ea:f3:b8:c7:ed:98:2f:45:23:99:3b:bd:b5:d0:11: 7b:58:27:81:b6:44:80:25:08:7e:42:56:36:b4:a3:58: 2c:71:28:79:24:c7:ae:dd:83:46:5f:08:df:43:5e:5b: 9b:a4:e3:4a:e8:87:b0:75:04:72:4e:2a:28:05:7c:f0: cf:81:1f:d1:19:a3:59:9a:ca:b0:ee:14:9a:0f:09:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 01:0f:e5:c7:b9:62:ab:ac:ed:cd:3b:7e:59:2b:01:34: f3:a3:7b:ff:5d:2c:26:09:14:39:99:2b:3b:cc:86:d2: e8:e0:0c:60:3a:e3:ca:34:51:42:dd:0e:e6:d5:4b:70: 4e:bc:9f:41:a9:01:51:05:e1:27:2c:d8:68:1d:fe:da: 84:f5:ae:2c:eb:9a:1b:cb:45:dc:bd:fc:8f:27:b9:38: 1c:e3:98:68:14:e9:01:77:ed:8b:a1:de:70:a9:de:1d: 4a:90:b5:d8:e6:36:aa:63:49:aa:48:77:66:76:c2:2b: 65:1b:51:9d:ad:d6:cf:14:88:57:7c:02:41:fc:d6:9f Fingerprint (MD5): F1:C0:5C:77:54:5E:1F:F7:1E:CA:2F:7D:FE:87:BB:2D Fingerprint (SHA1): DD:B4:B7:49:19:81:00:F6:81:5A:BE:EC:87:B1:EB:01:FE:5E:03:E9 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #5635: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5636: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5637: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5638: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5639: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #5640: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5641: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #5642: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #5643: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #5644: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #5645: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #5646: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #5647: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #5648: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5649: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Mar 19 21:04:25 2008 Not After : Tue Mar 19 21:04:25 2058 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61: fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82: 9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae: c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03: a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0: a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b: 2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9: aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e: 0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18: 57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc: 58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38: 5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62: 57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55: 0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a: f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7 Fingerprint (MD5): 35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27 Fingerprint (SHA1): 52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo untain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #5650: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 vfychain -d AllDB -pp -vv -o OID.2.16.840.1.113733.1.7.23.6 /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig n, Inc.",C=US" Validity: Not Before: Wed Nov 08 00:00:00 2006 Not After : Sun Nov 07 23:59:59 2021 Subject: "CN=VeriSign Class 3 Public Primary Certification Authority - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve riSign Trust Network,O="VeriSign, Inc.",C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc: 7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64: 85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42: b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec: ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3: 62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b: 9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f: e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db: 7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af: 1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a: b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7: ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74: 24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4: 8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95: ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f: 73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: CRL Distribution Points Distribution point: URI: "http://crl.verisign.com/pca3.crl" Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: OID.1.3.6.1.5.5.7.1.12 Data: Sequence { [1]: { [0]: { Sequence { Sequence { Sequence { "image/gif" Sequence { Sequence { Sequence { SHA-1 } 8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf: 80:6a:d4:48:18:2c:7b:19:2e } } Sequence { "http://logo.verisign.com/vslogo.gif" } } } } } } } Name: Certificate Policies Data: Policy Name: Certificate Policies AnyPolicy Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Qualifier Data: "https://www.verisign.com/cps" Name: Certificate Subject Key ID Data: 7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02: af:33:31:33 Name: Certificate Authority Key Identifier Issuer: Directory Name: "OU=Class 3 Public Primary Certification Auth ority,O="VeriSign, Inc.",C=US" Serial Number: 70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a: f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31: 47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c: d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0: ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d: 5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a: 84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1: d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6 Fingerprint (MD5): C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C Fingerprint (SHA1): 87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C= US,serialNumber=3014267,businessCategory=Private Organization,incorporati onState=Delaware,incorporationCountry=US" Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network ,O="VeriSign, Inc.",C=US" Returned value is 0, expected result is pass chains.sh: #5651: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -o OID.2.16.840.1.113733.1.7.23.6 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.13.1/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #5652: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5653: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162371 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5654: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5655: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5656: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5657: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1108162372 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5658: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der chains.sh: #5659: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5660: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5661: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1108162373 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5662: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der chains.sh: #5663: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5664: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5665: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1108162374 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5666: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der chains.sh: #5667: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5668: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5669: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1108162375 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5670: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der chains.sh: #5671: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #5672: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5673: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1108162376 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5674: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der chains.sh: #5675: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #5676: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5677: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1108162377 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5678: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der chains.sh: #5679: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #5680: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5681: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1108162378 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5682: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der chains.sh: #5683: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #5684: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5685: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1108162379 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5686: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der chains.sh: #5687: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5688: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162371 (0x420d3743) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:48 2011 Not After : Tue Nov 08 16:24:48 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 79:44:82:95:27:66:b1:25:af:3a:9b:83:ab:95:ba:86: 52:ed:0d:79:15:1d:3c:08:b1:26:90:a5:42:07:3c:a1: 46:ae:04:65:e6:e0:df:f0:f5:47:db:a9:ef:89:85:9b: 62:ee:1a:ca:18:8b:00:30:94:77:39:a6:50:4a:f8:fb: 9c:67:ef:fc:93:f0:75:e7:85:87:a8:e8:bc:b2:9e:3c: 37:81:6d:a6:28:db:8a:23:7a:88:89:92:9a:ad:2c:4b: 95:5e:5f:ac:fe:4a:40:e0:9b:f1:22:8c:6d:5a:aa:55: 23:04:0f:8b:bf:c0:bb:f2:4d:b3:9e:cb:68:30:78:5f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:a9:d0:70:41:ec:5f:fc:00:4a:3a:74: 69:37:52:82:1b:58:1e:3b:e0:02:14:32:1c:24:f3:86: ce:2e:b5:fb:b3:94:bf:fc:18:41:56:c8:dc:df:09 Fingerprint (MD5): 7C:0E:24:4E:FD:B5:B5:C6:56:A6:6F:00:E1:91:E7:32 Fingerprint (SHA1): 0B:A6:E1:F0:9A:52:11:D2:DC:F6:95:47:92:7F:E3:73:D1:6C:6F:01 Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #5689: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162371 (0x420d3743) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:48 2011 Not After : Tue Nov 08 16:24:48 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 79:44:82:95:27:66:b1:25:af:3a:9b:83:ab:95:ba:86: 52:ed:0d:79:15:1d:3c:08:b1:26:90:a5:42:07:3c:a1: 46:ae:04:65:e6:e0:df:f0:f5:47:db:a9:ef:89:85:9b: 62:ee:1a:ca:18:8b:00:30:94:77:39:a6:50:4a:f8:fb: 9c:67:ef:fc:93:f0:75:e7:85:87:a8:e8:bc:b2:9e:3c: 37:81:6d:a6:28:db:8a:23:7a:88:89:92:9a:ad:2c:4b: 95:5e:5f:ac:fe:4a:40:e0:9b:f1:22:8c:6d:5a:aa:55: 23:04:0f:8b:bf:c0:bb:f2:4d:b3:9e:cb:68:30:78:5f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:a9:d0:70:41:ec:5f:fc:00:4a:3a:74: 69:37:52:82:1b:58:1e:3b:e0:02:14:32:1c:24:f3:86: ce:2e:b5:fb:b3:94:bf:fc:18:41:56:c8:dc:df:09 Fingerprint (MD5): 7C:0E:24:4E:FD:B5:B5:C6:56:A6:6F:00:E1:91:E7:32 Fingerprint (SHA1): 0B:A6:E1:F0:9A:52:11:D2:DC:F6:95:47:92:7F:E3:73:D1:6C:6F:01 Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #5690: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162371 (0x420d3743) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:48 2011 Not After : Tue Nov 08 16:24:48 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 79:44:82:95:27:66:b1:25:af:3a:9b:83:ab:95:ba:86: 52:ed:0d:79:15:1d:3c:08:b1:26:90:a5:42:07:3c:a1: 46:ae:04:65:e6:e0:df:f0:f5:47:db:a9:ef:89:85:9b: 62:ee:1a:ca:18:8b:00:30:94:77:39:a6:50:4a:f8:fb: 9c:67:ef:fc:93:f0:75:e7:85:87:a8:e8:bc:b2:9e:3c: 37:81:6d:a6:28:db:8a:23:7a:88:89:92:9a:ad:2c:4b: 95:5e:5f:ac:fe:4a:40:e0:9b:f1:22:8c:6d:5a:aa:55: 23:04:0f:8b:bf:c0:bb:f2:4d:b3:9e:cb:68:30:78:5f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:a9:d0:70:41:ec:5f:fc:00:4a:3a:74: 69:37:52:82:1b:58:1e:3b:e0:02:14:32:1c:24:f3:86: ce:2e:b5:fb:b3:94:bf:fc:18:41:56:c8:dc:df:09 Fingerprint (MD5): 7C:0E:24:4E:FD:B5:B5:C6:56:A6:6F:00:E1:91:E7:32 Fingerprint (SHA1): 0B:A6:E1:F0:9A:52:11:D2:DC:F6:95:47:92:7F:E3:73:D1:6C:6F:01 Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #5691: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1108162371 (0x420d3743) Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:48 2011 Not After : Tue Nov 08 16:24:48 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44: db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb: c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f: 41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69: fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8: 89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3: c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52: 29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db: ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44: 29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02: 81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f: 00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95: f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12: 31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71: da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17: 54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8: 83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10: f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21: a5:10 DSA Public Key: Prime: 98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c: b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04: 82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f: af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a: 4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad: af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65: c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe: 18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d Subprime: b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1: 76:27:03:81 Base: 04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04: 4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c: f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50: 82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e: 57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b: 5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87: 60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb: 35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10 PublicValue: 79:44:82:95:27:66:b1:25:af:3a:9b:83:ab:95:ba:86: 52:ed:0d:79:15:1d:3c:08:b1:26:90:a5:42:07:3c:a1: 46:ae:04:65:e6:e0:df:f0:f5:47:db:a9:ef:89:85:9b: 62:ee:1a:ca:18:8b:00:30:94:77:39:a6:50:4a:f8:fb: 9c:67:ef:fc:93:f0:75:e7:85:87:a8:e8:bc:b2:9e:3c: 37:81:6d:a6:28:db:8a:23:7a:88:89:92:9a:ad:2c:4b: 95:5e:5f:ac:fe:4a:40:e0:9b:f1:22:8c:6d:5a:aa:55: 23:04:0f:8b:bf:c0:bb:f2:4d:b3:9e:cb:68:30:78:5f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest Signature: 30:2d:02:15:00:a9:d0:70:41:ec:5f:fc:00:4a:3a:74: 69:37:52:82:1b:58:1e:3b:e0:02:14:32:1c:24:f3:86: ce:2e:b5:fb:b3:94:bf:fc:18:41:56:c8:dc:df:09 Fingerprint (MD5): 7C:0E:24:4E:FD:B5:B5:C6:56:A6:6F:00:E1:91:E7:32 Fingerprint (SHA1): 0B:A6:E1:F0:9A:52:11:D2:DC:F6:95:47:92:7F:E3:73:D1:6C:6F:01 Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #5692: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5693: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5694: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5695: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5696: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5697: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5698: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #5699: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5700: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5701: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5702: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #5703: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5704: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5705: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5706: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #5707: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #5708: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5709: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5710: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der chains.sh: #5711: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5712: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5713: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5714: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #5715: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5716: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5717: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5718: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #5719: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20111108162502Z nextupdate=20121108162502Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Nov 08 16:25:02 2011 Next Update: Thu Nov 08 16:25:02 2012 CRL Extensions: chains.sh: #5720: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108162502Z nextupdate=20121108162502Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:25:02 2011 Next Update: Thu Nov 08 16:25:02 2012 CRL Extensions: chains.sh: #5721: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20111108162502Z nextupdate=20121108162502Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Nov 08 16:25:02 2011 Next Update: Thu Nov 08 16:25:02 2012 CRL Extensions: chains.sh: #5722: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20111108162502Z nextupdate=20121108162502Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Nov 08 16:25:02 2011 Next Update: Thu Nov 08 16:25:02 2012 CRL Extensions: chains.sh: #5723: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20111108162503Z addcert 14 20111108162503Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Nov 08 16:25:03 2011 Next Update: Thu Nov 08 16:25:02 2012 Entry (1): Serial Number: 14 (0xe) Revocation Date: Tue Nov 08 16:25:03 2011 CRL Extensions: chains.sh: #5724: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108162504Z addcert 15 20111108162504Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:25:04 2011 Next Update: Thu Nov 08 16:25:02 2012 Entry (1): Serial Number: 15 (0xf) Revocation Date: Tue Nov 08 16:25:04 2011 CRL Extensions: chains.sh: #5725: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5726: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5727: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5728: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #5729: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #5730: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #5731: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #5732: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #5733: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #5734: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:56 2011 Not After : Tue Nov 08 16:24:56 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ed:af:48:81:2e:25:49:79:9e:c2:ea:0b:7d:f4:fa: a0:d0:1c:9f:ac:5a:31:29:9c:11:dd:a1:38:cb:47:7c: 93:da:de:1d:5b:eb:df:cc:8d:a9:42:b9:e0:a7:a5:70: 28:7e:11:49:0e:08:26:5d:57:e4:64:3c:25:38:00:c9: 0d:91:8e:1a:9c:26:18:1b:b4:c7:26:32:d3:2b:2a:e4: 42:35:3e:88:28:c0:13:13:be:36:7f:a5:83:1c:08:3b: 0d:19:8c:63:9c:01:d4:7a:5d:b2:d2:53:7b:53:05:ff: fe:9b:3a:9f:9e:c1:24:ad:e2:03:b4:f7:74:27:b2:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b3:31:0c:e8:09:b1:e8:7a:ca:62:6d:50:c9:5b:ec:b3: c3:2b:2f:5b:9b:c9:5f:d4:73:48:43:42:29:17:ef:e6: 85:d6:74:ce:3c:52:47:e2:b7:60:a0:76:ff:71:8f:01: f7:fb:0e:f6:99:0b:47:e0:fc:6a:83:7e:8d:dc:26:1e: 34:c4:16:22:74:b3:ee:17:74:35:63:3a:d7:d3:8c:13: 22:5a:38:9c:44:6d:1e:fb:c8:4c:b5:4b:51:10:7a:db: b4:d8:6c:52:5e:90:5f:26:da:a8:73:02:b9:a1:2e:69: a6:da:fd:95:a3:fd:e4:77:a9:89:ec:8a:7a:d6:38:91 Fingerprint (MD5): 2D:CB:24:BD:CD:C9:8E:50:49:EF:DC:F3:EA:95:8E:BA Fingerprint (SHA1): 88:67:1E:A6:99:1A:55:6A:41:B1:EC:34:33:89:98:9E:90:17:8D:89 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5735: Revocation: Verifying certificate(s) EE11CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5736: Revocation: Verifying certificate(s) EE12CA1.der with flags -g leaf -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Tue Nov 08 16:24:56 2011 Not After : Tue Nov 08 16:24:56 2061 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ed:af:48:81:2e:25:49:79:9e:c2:ea:0b:7d:f4:fa: a0:d0:1c:9f:ac:5a:31:29:9c:11:dd:a1:38:cb:47:7c: 93:da:de:1d:5b:eb:df:cc:8d:a9:42:b9:e0:a7:a5:70: 28:7e:11:49:0e:08:26:5d:57:e4:64:3c:25:38:00:c9: 0d:91:8e:1a:9c:26:18:1b:b4:c7:26:32:d3:2b:2a:e4: 42:35:3e:88:28:c0:13:13:be:36:7f:a5:83:1c:08:3b: 0d:19:8c:63:9c:01:d4:7a:5d:b2:d2:53:7b:53:05:ff: fe:9b:3a:9f:9e:c1:24:ad:e2:03:b4:f7:74:27:b2:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: b3:31:0c:e8:09:b1:e8:7a:ca:62:6d:50:c9:5b:ec:b3: c3:2b:2f:5b:9b:c9:5f:d4:73:48:43:42:29:17:ef:e6: 85:d6:74:ce:3c:52:47:e2:b7:60:a0:76:ff:71:8f:01: f7:fb:0e:f6:99:0b:47:e0:fc:6a:83:7e:8d:dc:26:1e: 34:c4:16:22:74:b3:ee:17:74:35:63:3a:d7:d3:8c:13: 22:5a:38:9c:44:6d:1e:fb:c8:4c:b5:4b:51:10:7a:db: b4:d8:6c:52:5e:90:5f:26:da:a8:73:02:b9:a1:2e:69: a6:da:fd:95:a3:fd:e4:77:a9:89:ec:8a:7a:d6:38:91 Fingerprint (MD5): 2D:CB:24:BD:CD:C9:8E:50:49:EF:DC:F3:EA:95:8E:BA Fingerprint (SHA1): 88:67:1E:A6:99:1A:55:6A:41:B1:EC:34:33:89:98:9E:90:17:8D:89 Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #5737: Revocation: Verifying certificate(s) EE11CA1.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #5738: Revocation: Verifying certificate(s) EE21CA2.der with flags -g chain -m crl -d AllDB -t Root.der - PASSED ./chains.sh: line 806: ping: command not found OCSP server not accessible, skipping OCSP tests chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #5739: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -m 1108162380 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? chains.sh: #5740: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #5741: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #5742: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #5743: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1108162381 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5744: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der chains.sh: #5745: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #5746: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 /localhost-18966-CA0-1108162270.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5747: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108162257.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5748: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der chains.sh: #5749: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #5750: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-CA0-1108162270.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5751: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1108162382 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5752: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der chains.sh: #5753: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #5754: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 /localhost-18966-CA0-1108162270.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5755: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108162258.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5756: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der chains.sh: #5757: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #5758: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === Generating key. This may take a few moments... chains.sh: #5759: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1108162383 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #5760: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der chains.sh: #5761: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #5762: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-CA0-1108162270.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5763: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108162259.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5764: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der chains.sh: #5765: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #5766: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-CA0-1108162270.crl -1 -1 -1 n n === Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #5767: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.13.1/mozilla/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 /localhost-18966-CA0Root-1108162260.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #5768: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der chains.sh: #5769: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20111108162513Z nextupdate=20121108162513Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Tue Nov 08 16:25:13 2011 Next Update: Thu Nov 08 16:25:13 2012 CRL Extensions: chains.sh: #5770: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108162513Z nextupdate=20121108162513Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:25:13 2011 Next Update: Thu Nov 08 16:25:13 2012 CRL Extensions: chains.sh: #5771: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20111108162513Z nextupdate=20121108162513Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Tue Nov 08 16:25:13 2011 Next Update: Thu Nov 08 16:25:13 2012 CRL Extensions: chains.sh: #5772: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20111108162514Z nextupdate=20121108162514Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Tue Nov 08 16:25:14 2011 Next Update: Thu Nov 08 16:25:14 2012 CRL Extensions: chains.sh: #5773: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108162515Z addcert 20 20111108162515Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:25:15 2011 Next Update: Thu Nov 08 16:25:13 2012 Entry (1): Serial Number: 20 (0x14) Revocation Date: Tue Nov 08 16:25:15 2011 CRL Extensions: chains.sh: #5774: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20111108162516Z addcert 40 20111108162516Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Tue Nov 08 16:25:16 2011 Next Update: Thu Nov 08 16:25:13 2012 Entry (1): Serial Number: 20 (0x14) Revocation Date: Tue Nov 08 16:25:15 2011 Entry (2): Serial Number: 40 (0x28) Revocation Date: Tue Nov 08 16:25:16 2011 CRL Extensions: chains.sh: #5775: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #5776: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #5777: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #5778: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined chains.sh Skipping test using AIA fetching, NSS_AIA_HTTP not defined TIMESTAMP chains END: Tue Nov 8 16:25:17 UTC 2011 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_64= NSS_CYCLES="" NSS_TESTS="" NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr" NSS_SSL_RUN="cov auth stress" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= Tests summary: -------------- Passed: 5778 Failed: 0 Failed with core: 0 Unknown status: 0 + cd ../../../../ + killall selfserv_9519 selfserv_9519: no process found + : ++ grep -c FAILED ./mozilla/tests_results/security/localhost.1/output.log + TEST_FAILURES=0 + : test suite completed + '[' 0 -ne 0 ']' + echo 'test suite completed' + exit 0 Processing files: nss-3.13.1-2.fc16.i686 Provides: config(nss) = 3.13.1-2.fc16 libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.10.2) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.11.2) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.11.9) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.10) libnss3.so(NSS_3.12.3) libnss3.so(NSS_3.12.4) libnss3.so(NSS_3.12.5) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.12.7) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.2) libnss3.so(NSS_3.2.1) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.7.1) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssckbi.so libnssckbi.so(NSS_3.1) libnsspem.so libnsspem.so(NSS_3.1) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.12.10) libsmime3.so(NSS_3.12.2) libsmime3.so(NSS_3.13) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.2.1) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.4.1) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.7) libsmime3.so(NSS_3.7.2) libsmime3.so(NSS_3.8) libsmime3.so(NSS_3.9) libsmime3.so(NSS_3.9.3) libssl3.so libssl3.so(NSS_3.11.4) libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.10) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.13) libssl3.so(NSS_3.2) libssl3.so(NSS_3.2.1) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) Requires(interp): /sbin/ldconfig /sbin/ldconfig Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): /sbin/ldconfig Requires(postun): /sbin/ldconfig Requires: libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1) libc.so.6(GLIBC_2.1.3) libc.so.6(GLIBC_2.3) libc.so.6(GLIBC_2.3.4) libc.so.6(GLIBC_2.4) libdl.so.2 libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.1) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.6) libnss3.so(NSS_3.2) libnss3.so(NSS_3.3) libnss3.so(NSS_3.3.1) libnss3.so(NSS_3.4) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.3) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.3) libnssutil3.so(NSSUTIL_3.12.5) libnssutil3.so(NSSUTIL_3.13) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.0) libz.so.1 rtld(GNU_HASH) Processing files: nss-tools-3.13.1-2.fc16.i686 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1) libc.so.6(GLIBC_2.3) libc.so.6(GLIBC_2.3.4) libc.so.6(GLIBC_2.4) libdl.so.2 libnspr4.so libnss3.so libnss3.so(NSS_3.10) libnss3.so(NSS_3.11) libnss3.so(NSS_3.11.7) libnss3.so(NSS_3.12) libnss3.so(NSS_3.12.1) libnss3.so(NSS_3.12.9) libnss3.so(NSS_3.13) libnss3.so(NSS_3.2) libnss3.so(NSS_3.3) libnss3.so(NSS_3.4) libnss3.so(NSS_3.5) libnss3.so(NSS_3.6) libnss3.so(NSS_3.7) libnss3.so(NSS_3.8) libnss3.so(NSS_3.9) libnss3.so(NSS_3.9.2) libnss3.so(NSS_3.9.3) libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libnssutil3.so(NSSUTIL_3.12.3) libnssutil3.so(NSSUTIL_3.12.5) libnssutil3.so(NSSUTIL_3.12.7) libnssutil3.so(NSSUTIL_3.13) libplc4.so libplds4.so libpthread.so.0 libpthread.so.0(GLIBC_2.0) libsmime3.so libsmime3.so(NSS_3.10) libsmime3.so(NSS_3.2) libsmime3.so(NSS_3.3) libsmime3.so(NSS_3.4) libsmime3.so(NSS_3.6) libsmime3.so(NSS_3.9.3) libsqlite3.so.0 libssl3.so libssl3.so(NSS_3.11.8) libssl3.so(NSS_3.12.6) libssl3.so(NSS_3.2) libssl3.so(NSS_3.4) libssl3.so(NSS_3.7.4) libz.so.1 rtld(GNU_HASH) Processing files: nss-sysinit-3.13.1-2.fc16.i686 Provides: config(nss-sysinit) = 3.13.1-2.fc16 libnsssysinit.so nss-system-init Requires(interp): /bin/sh Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires(post): coreutils sed Requires: /bin/sh libc.so.6 libc.so.6(GLIBC_2.0) libc.so.6(GLIBC_2.1.3) libc.so.6(GLIBC_2.3) libdl.so.2 libnspr4.so libnssutil3.so libnssutil3.so(NSSUTIL_3.12) libplc4.so libplds4.so libpthread.so.0 rtld(GNU_HASH) Processing files: nss-devel-3.13.1-2.fc16.i686 Provides: nss-static = 3.13.1-2.fc16 pkgconfig(nss) = 3.13.1 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Requires: /bin/sh /usr/bin/pkg-config pkgconfig(nspr) >= 4.8.9 pkgconfig(nss-util) >= 3.13.1 Processing files: nss-pkcs11-devel-3.13.1-2.fc16.i686 Provides: nss-pkcs11-devel-static = 3.13.1-2.fc16 Requires(rpmlib): rpmlib(CompressedFileNames) <= 3.0.4-1 rpmlib(FileDigests) <= 4.6.0-1 rpmlib(PayloadFilesHavePrefix) <= 4.0-1 Processing files: nss-debuginfo-3.13.1-2.fc16.i686 Checking for unpackaged file(s): /usr/lib/rpm/check-files /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386 warning: Could not canonicalize hostname: x86-04.phx2.fedoraproject.org Wrote: /builddir/build/RPMS/nss-3.13.1-2.fc16.i686.rpm Wrote: /builddir/build/RPMS/nss-tools-3.13.1-2.fc16.i686.rpm Wrote: /builddir/build/RPMS/nss-sysinit-3.13.1-2.fc16.i686.rpm Wrote: /builddir/build/RPMS/nss-devel-3.13.1-2.fc16.i686.rpm Wrote: /builddir/build/RPMS/nss-pkcs11-devel-3.13.1-2.fc16.i686.rpm Wrote: /builddir/build/RPMS/nss-debuginfo-3.13.1-2.fc16.i686.rpm Executing(%clean): /bin/sh -e /var/tmp/rpm-tmp.j57u2a + umask 022 + cd /builddir/build/BUILD + cd nss-3.13.1 + /bin/rm -rf /builddir/build/BUILDROOT/nss-3.13.1-2.fc16.i386 + exit 0 Child returncode was: 0 LEAVE do -->